Skip to content

Commit d92c5ce

Browse files
fix lint
1 parent 576a942 commit d92c5ce

File tree

11 files changed

+64
-57
lines changed

11 files changed

+64
-57
lines changed

3-networks-dual-svpc/envs/production/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ The purpose of this step is to set up base and restricted shared VPCs with defau
2424
| base\_hub\_nat\_num\_addresses\_region1 | Number of external IPs to reserve for first Cloud NAT in Base Hub. | `number` | `2` | no |
2525
| base\_hub\_nat\_num\_addresses\_region2 | Number of external IPs to reserve for second Cloud NAT in Base Hub. | `number` | `2` | no |
2626
| base\_hub\_windows\_activation\_enabled | Enable Windows license activation for Windows workloads in Base Hub | `bool` | `false` | no |
27+
| base\_vpc\_flow\_logs | enable\_logging: set to true to enable VPC flow logging for the subnetworks.<br> aggregation\_interval: Toggles the aggregation interval for collecting flow logs. Increasing the interval time will reduce the amount of generated flow logs for long lasting connections. Possible values are: INTERVAL\_5\_SEC, INTERVAL\_30\_SEC, INTERVAL\_1\_MIN, INTERVAL\_5\_MIN, INTERVAL\_10\_MIN, INTERVAL\_15\_MIN.<br> flow\_sampling: Set the sampling rate of VPC flow logs within the subnetwork where 1.0 means all collected logs are reported and 0.0 means no logs are reported. The value of the field must be in [0, 1].<br> metadata: Configures whether metadata fields should be added to the reported VPC flow logs. Possible values are: EXCLUDE\_ALL\_METADATA, INCLUDE\_ALL\_METADATA, CUSTOM\_METADATA.<br> metadata\_fields: ist of metadata fields that should be added to reported logs. Can only be specified if VPC flow logs for this subnetwork is enabled and "metadata" is set to CUSTOM\_METADATA.<br> filter\_expr: Export filter used to define which VPC flow logs should be logged, as as CEL expression. See https://cloud.google.com/vpc/docs/flow-logs#filtering for details on how to format this field. | <pre>object({<br> enable_logging = optional(string, "true")<br> aggregation_interval = optional(string, "INTERVAL_5_SEC")<br> flow_sampling = optional(string, "0.5")<br> metadata = optional(string, "INCLUDE_ALL_METADATA")<br> metadata_fields = optional(list(string), [])<br> filter_expr = optional(string, "true")<br> })</pre> | `{}` | no |
2728
| custom\_restricted\_services | List of custom services to be protected by the VPC-SC perimeter. If empty, all supported services (https://cloud.google.com/vpc-service-controls/docs/supported-products) will be protected. | `list(string)` | `[]` | no |
2829
| domain | The DNS name of peering managed zone, for instance 'example.com.'. Must end with a period. | `string` | n/a | yes |
2930
| egress\_policies | A list of all [egress policies](https://cloud.google.com/vpc-service-controls/docs/ingress-egress-rules#egress-rules-reference) to use in an enforced perimeter. Each list object has a `from` and `to` value that describes egress\_from and egress\_to.<br><br>Example: `[{ from={ identities=[], identity_type="ID_TYPE" }, to={ resources=[], operations={ "SRV_NAME"={ OP_TYPE=[] }}}}]`<br><br>Valid Values:<br>`ID_TYPE` = `null` or `IDENTITY_TYPE_UNSPECIFIED` (only allow indentities from list); `ANY_IDENTITY`; `ANY_USER_ACCOUNT`; `ANY_SERVICE_ACCOUNT`<br>`SRV_NAME` = "`*`" (allow all services) or [Specific Services](https://cloud.google.com/vpc-service-controls/docs/supported-products#supported_products)<br>`OP_TYPE` = [methods](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions) or [permissions](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions) | <pre>list(object({<br> from = any<br> to = any<br> }))</pre> | `[]` | no |
@@ -43,6 +44,7 @@ The purpose of this step is to set up base and restricted shared VPCs with defau
4344
| restricted\_hub\_nat\_num\_addresses\_region1 | Number of external IPs to reserve for first Cloud NAT in Restricted Hub. | `number` | `2` | no |
4445
| restricted\_hub\_nat\_num\_addresses\_region2 | Number of external IPs to reserve for second Cloud NAT in Restricted Hub. | `number` | `2` | no |
4546
| restricted\_hub\_windows\_activation\_enabled | Enable Windows license activation for Windows workloads in Restricted Hub. | `bool` | `false` | no |
47+
| restricted\_vpc\_flow\_logs | enable\_logging: set to true to enable VPC flow logging for the subnetworks.<br> aggregation\_interval: Toggles the aggregation interval for collecting flow logs. Increasing the interval time will reduce the amount of generated flow logs for long lasting connections. Possible values are: INTERVAL\_5\_SEC, INTERVAL\_30\_SEC, INTERVAL\_1\_MIN, INTERVAL\_5\_MIN, INTERVAL\_10\_MIN, INTERVAL\_15\_MIN.<br> flow\_sampling: Set the sampling rate of VPC flow logs within the subnetwork where 1.0 means all collected logs are reported and 0.0 means no logs are reported. The value of the field must be in [0, 1].<br> metadata: Configures whether metadata fields should be added to the reported VPC flow logs. Possible values are: EXCLUDE\_ALL\_METADATA, INCLUDE\_ALL\_METADATA, CUSTOM\_METADATA.<br> metadata\_fields: ist of metadata fields that should be added to reported logs. Can only be specified if VPC flow logs for this subnetwork is enabled and "metadata" is set to CUSTOM\_METADATA.<br> filter\_expr: Export filter used to define which VPC flow logs should be logged, as as CEL expression. See https://cloud.google.com/vpc/docs/flow-logs#filtering for details on how to format this field. | <pre>object({<br> enable_logging = optional(string, "true")<br> aggregation_interval = optional(string, "INTERVAL_5_SEC")<br> flow_sampling = optional(string, "0.5")<br> metadata = optional(string, "INCLUDE_ALL_METADATA")<br> metadata_fields = optional(list(string), [])<br> filter_expr = optional(string, "true")<br> })</pre> | `{}` | no |
4648
| target\_name\_server\_addresses | List of IPv4 address of target name servers for the forwarding zone configuration. See https://cloud.google.com/dns/docs/overview#dns-forwarding-zones for details on target name servers in the context of Cloud DNS forwarding zones. | `list(map(any))` | n/a | yes |
4749
| tfc\_org\_name | Name of the TFC organization | `string` | `""` | no |
4850

3-networks-dual-svpc/envs/production/main.tf

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -66,32 +66,32 @@ locals {
6666
]
6767
}
6868

69-
##############################
69+
##############################
7070

71-
restricted_services = length(var.custom_restricted_services) != 0 ? var.custom_restricted_services : local.supported_restricted_service
72-
restricted_services_dry_run = length(var.custom_restricted_services) != 0 ? var.custom_restricted_services : local.supported_restricted_service
71+
restricted_services = length(var.custom_restricted_services) != 0 ? var.custom_restricted_services : local.supported_restricted_service
72+
restricted_services_dry_run = length(var.custom_restricted_services) != 0 ? var.custom_restricted_services : local.supported_restricted_service
7373

74-
bgp_asn_number = var.enable_partner_interconnect ? "16550" : "64514"
75-
# dns_bgp_asn_number = var.enable_partner_interconnect ? "16550" : var.bgp_asn_dns
74+
bgp_asn_number = var.enable_partner_interconnect ? "16550" : "64514"
75+
# dns_bgp_asn_number = var.enable_partner_interconnect ? "16550" : var.bgp_asn_dns
7676

77-
# dedicated_interconnect_egress_policy = var.enable_dedicated_interconnect ? [
78-
# {
79-
# "from" = {
80-
# "identity_type" = ""
81-
# "identities" = ["serviceAccount:${local.networks_service_account}"]
82-
# },
83-
# "to" = {
84-
# "resources" = ["projects/${local.interconnect_project_number}"]
85-
# "operations" = {
86-
# "compute.googleapis.com" = {
87-
# "methods" = ["*"]
88-
# }
89-
# }
90-
# }
91-
# },
92-
# ] : []
77+
# dedicated_interconnect_egress_policy = var.enable_dedicated_interconnect ? [
78+
# {
79+
# "from" = {
80+
# "identity_type" = ""
81+
# "identities" = ["serviceAccount:${local.networks_service_account}"]
82+
# },
83+
# "to" = {
84+
# "resources" = ["projects/${local.interconnect_project_number}"]
85+
# "operations" = {
86+
# "compute.googleapis.com" = {
87+
# "methods" = ["*"]
88+
# }
89+
# }
90+
# }
91+
# },
92+
# ] : []
9393

94-
supported_restricted_service = [
94+
supported_restricted_service = [
9595
"accessapproval.googleapis.com",
9696
"adsdatahub.googleapis.com",
9797
"aiplatform.googleapis.com",
@@ -216,7 +216,7 @@ supported_restricted_service = [
216216
"workstations.googleapis.com",
217217
]
218218

219-
######################################
219+
######################################
220220
}
221221

222222
module "base_env" {
@@ -247,7 +247,7 @@ module "base_env" {
247247
restricted_private_service_connect_ip = "10.17.0.8"
248248
remote_state_bucket = var.remote_state_bucket
249249
tfc_org_name = var.tfc_org_name
250-
target_name_server_addresses = var.target_name_server_addresses
250+
target_name_server_addresses = var.target_name_server_addresses
251251
}
252252
#################### net_hub below
253253

3-networks-dual-svpc/envs/production/remote.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ locals {
1818
default_region1 = data.terraform_remote_state.bootstrap.outputs.common_config.default_region
1919
default_region2 = data.terraform_remote_state.bootstrap.outputs.common_config.default_region_2
2020
####
21-
organization_service_account = data.terraform_remote_state.bootstrap.outputs.organization_step_terraform_service_account_email
22-
networks_service_account = data.terraform_remote_state.bootstrap.outputs.networks_step_terraform_service_account_email
23-
projects_service_account = data.terraform_remote_state.bootstrap.outputs.projects_step_terraform_service_account_email
21+
organization_service_account = data.terraform_remote_state.bootstrap.outputs.organization_step_terraform_service_account_email
22+
networks_service_account = data.terraform_remote_state.bootstrap.outputs.networks_step_terraform_service_account_email
23+
projects_service_account = data.terraform_remote_state.bootstrap.outputs.projects_step_terraform_service_account_email
2424

25-
restricted_project_id = data.terraform_remote_state.org.outputs.shared_vpc_projects[local.env].restricted_shared_vpc_project_id
26-
restricted_project_number = data.terraform_remote_state.org.outputs.shared_vpc_projects[local.env].restricted_shared_vpc_project_number
27-
base_project_id = data.terraform_remote_state.org.outputs.shared_vpc_projects[local.env].base_shared_vpc_project_id
25+
restricted_project_id = data.terraform_remote_state.org.outputs.shared_vpc_projects[local.env].restricted_shared_vpc_project_id
26+
restricted_project_number = data.terraform_remote_state.org.outputs.shared_vpc_projects[local.env].restricted_shared_vpc_project_number
27+
base_project_id = data.terraform_remote_state.org.outputs.shared_vpc_projects[local.env].base_shared_vpc_project_id
2828

2929
}
3030

3-networks-dual-svpc/envs/shared/README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ The purpose of this step is to set up the global [DNS Hub](https://cloud.google.
1919
| firewall\_policies\_enable\_logging | Toggle hierarchical firewall logging. | `bool` | `true` | no |
2020
| preactivate\_partner\_interconnect | Preactivate Partner Interconnect VLAN attachment in the environment. | `bool` | `false` | no |
2121
| remote\_state\_bucket | Backend bucket to load Terraform Remote State Data from previous steps. | `string` | n/a | yes |
22-
| target\_name\_server\_addresses | List of IPv4 address of target name servers for the forwarding zone configuration. See https://cloud.google.com/dns/docs/overview#dns-forwarding-zones for details on target name servers in the context of Cloud DNS forwarding zones. | `list(map(any))` | n/a | yes |
2322
| tfc\_org\_name | Name of the TFC organization | `string` | `""` | no |
2423
| vpc\_flow\_logs | enable\_logging: set to true to enable VPC flow logging for the subnetworks.<br> aggregation\_interval: Toggles the aggregation interval for collecting flow logs. Increasing the interval time will reduce the amount of generated flow logs for long lasting connections. Possible values are: INTERVAL\_5\_SEC, INTERVAL\_30\_SEC, INTERVAL\_1\_MIN, INTERVAL\_5\_MIN, INTERVAL\_10\_MIN, INTERVAL\_15\_MIN.<br> flow\_sampling: Set the sampling rate of VPC flow logs within the subnetwork where 1.0 means all collected logs are reported and 0.0 means no logs are reported. The value of the field must be in [0, 1].<br> metadata: Configures whether metadata fields should be added to the reported VPC flow logs. Possible values are: EXCLUDE\_ALL\_METADATA, INCLUDE\_ALL\_METADATA, CUSTOM\_METADATA.<br> metadata\_fields: ist of metadata fields that should be added to reported logs. Can only be specified if VPC flow logs for this subnetwork is enabled and "metadata" is set to CUSTOM\_METADATA.<br> filter\_expr: Export filter used to define which VPC flow logs should be logged, as as CEL expression. See https://cloud.google.com/vpc/docs/flow-logs#filtering for details on how to format this field. | <pre>object({<br> enable_logging = optional(string, "true")<br> aggregation_interval = optional(string, "INTERVAL_5_SEC")<br> flow_sampling = optional(string, "0.5")<br> metadata = optional(string, "INCLUDE_ALL_METADATA")<br> metadata_fields = optional(list(string), [])<br> filter_expr = optional(string, "true")<br> })</pre> | `{}` | no |
2524

3-networks-dual-svpc/envs/shared/remote.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,12 +15,12 @@
1515
*/
1616

1717
locals {
18-
env = "common"
19-
environment_code = "c"
20-
dns_bgp_asn_number = var.enable_partner_interconnect ? "16550" : var.bgp_asn_dns
21-
default_region1 = data.terraform_remote_state.bootstrap.outputs.common_config.default_region
22-
default_region2 = data.terraform_remote_state.bootstrap.outputs.common_config.default_region_2
23-
folder_prefix = data.terraform_remote_state.bootstrap.outputs.common_config.folder_prefix
18+
env = "common"
19+
environment_code = "c"
20+
dns_bgp_asn_number = var.enable_partner_interconnect ? "16550" : var.bgp_asn_dns
21+
default_region1 = data.terraform_remote_state.bootstrap.outputs.common_config.default_region
22+
default_region2 = data.terraform_remote_state.bootstrap.outputs.common_config.default_region_2
23+
folder_prefix = data.terraform_remote_state.bootstrap.outputs.common_config.folder_prefix
2424
#interconnect_project_id = data.terraform_remote_state.org.outputs.interconnect_project_id
2525
parent_id = data.terraform_remote_state.bootstrap.outputs.common_config.parent_id
2626
bootstrap_folder_name = data.terraform_remote_state.bootstrap.outputs.common_config.bootstrap_folder_name

3-networks-dual-svpc/modules/base_env/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@
3232
| restricted\_subnet\_proxy\_ranges | The base proxy-only subnet primary IPTs ranges to the Restricted Shared Vpc. | `map(string)` | n/a | yes |
3333
| restricted\_subnet\_secondary\_ranges | The base subnet secondary IPTs ranges to the Restricted Shared Vpc | `map(list(map(string)))` | n/a | yes |
3434
| restricted\_vpc\_flow\_logs | aggregation\_interval: Toggles the aggregation interval for collecting flow logs. Increasing the interval time will reduce the amount of generated flow logs for long lasting connections. Possible values are: INTERVAL\_5\_SEC, INTERVAL\_30\_SEC, INTERVAL\_1\_MIN, INTERVAL\_5\_MIN, INTERVAL\_10\_MIN, INTERVAL\_15\_MIN.<br> flow\_sampling: Set the sampling rate of VPC flow logs within the subnetwork where 1.0 means all collected logs are reported and 0.0 means no logs are reported. The value of the field must be in [0, 1].<br> metadata: Configures whether metadata fields should be added to the reported VPC flow logs. Possible values are: EXCLUDE\_ALL\_METADATA, INCLUDE\_ALL\_METADATA, CUSTOM\_METADATA.<br> metadata\_fields: ist of metadata fields that should be added to reported logs. Can only be specified if VPC flow logs for this subnetwork is enabled and "metadata" is set to CUSTOM\_METADATA.<br> filter\_expr: Export filter used to define which VPC flow logs should be logged, as as CEL expression. See https://cloud.google.com/vpc/docs/flow-logs#filtering for details on how to format this field. | <pre>object({<br> aggregation_interval = optional(string, "INTERVAL_5_SEC")<br> flow_sampling = optional(string, "0.5")<br> metadata = optional(string, "INCLUDE_ALL_METADATA")<br> metadata_fields = optional(list(string), [])<br> filter_expr = optional(string, "true")<br> })</pre> | `{}` | no |
35+
| target\_name\_server\_addresses | List of IPv4 address of target name servers for the forwarding zone configuration. See https://cloud.google.com/dns/docs/overview#dns-forwarding-zones for details on target name servers in the context of Cloud DNS forwarding zones. | `list(map(any))` | `[]` | no |
3536
| tfc\_org\_name | Name of the TFC organization | `string` | n/a | yes |
3637

3738
## Outputs
@@ -56,5 +57,6 @@
5657
| restricted\_subnets\_names | The names of the subnets being created |
5758
| restricted\_subnets\_secondary\_ranges | The secondary ranges associated with these subnets |
5859
| restricted\_subnets\_self\_links | The self-links of subnets being created |
60+
| target\_name\_server\_addresses | List of IPv4 address of target name servers for the forwarding zone configuration |
5961

6062
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->

3-networks-dual-svpc/modules/base_env/main.tf

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -169,8 +169,8 @@ locals {
169169
module "restricted_shared_vpc" {
170170
source = "../restricted_shared_vpc"
171171

172-
project_id = local.restricted_project_id
173-
project_number = local.restricted_project_number
172+
project_id = local.restricted_project_id
173+
project_number = local.restricted_project_number
174174

175175

176176
environment_code = var.environment_code
@@ -187,14 +187,14 @@ module "restricted_shared_vpc" {
187187
"serviceAccount:${local.projects_service_account}",
188188
"serviceAccount:${local.organization_service_account}",
189189
], var.perimeter_additional_members))
190-
private_service_cidr = var.restricted_private_service_cidr
191-
private_service_connect_ip = var.restricted_private_service_connect_ip
192-
bgp_asn_subnet = local.bgp_asn_number
193-
default_region1 = var.default_region1
194-
default_region2 = var.default_region2
195-
domain = var.domain
196-
ingress_policies = var.ingress_policies
197-
ingress_policies_dry_run = var.ingress_policies_dry_run
190+
private_service_cidr = var.restricted_private_service_cidr
191+
private_service_connect_ip = var.restricted_private_service_connect_ip
192+
bgp_asn_subnet = local.bgp_asn_number
193+
default_region1 = var.default_region1
194+
default_region2 = var.default_region2
195+
domain = var.domain
196+
ingress_policies = var.ingress_policies
197+
ingress_policies_dry_run = var.ingress_policies_dry_run
198198
egress_policies = distinct(concat(
199199
#local.dedicated_interconnect_egress_policy,
200200
var.egress_policies

0 commit comments

Comments
 (0)