A Terraform module to create a Google Folder IAM on Google Cloud Services (GCP).
This module supports Terraform version 1 and is compatible with the Terraform Google Provider version 4. and 5._**
This module is part of our Infrastructure as Code (IaC) framework that enables our users and customers to easily deploy and manage reusable, secure, and production-grade cloud infrastructure.
- Module Features
- Getting Started
- Module Argument Reference
- Module Outputs
- External Documentation
- Module Versioning
- About Mineiros
- Reporting Issues
- Contributing
- Makefile Targets
- License
This module implements the following terraform resources:
google_folder_iam_binding
google_folder_iam_member
google_folder_iam_policy
Most basic usage just setting required arguments:
module "terraform-google-folder-iam" {
source = "github.com/mineiros-io/terraform-google-folder-iam.git?ref=v0.2.0"
folder = "folders/1234567"
role = "roles/editor"
members = ["user:admin@example.com"]
}
See variables.tf and examples/ for details and use-cases.
-
module_enabled
: (Optionalbool
)Specifies whether resources in the module will be created.
Default is
true
. -
module_depends_on
: (Optionallist(dependency)
)A list of dependencies. Any object can be assigned to this list to define a hidden external dependency.
Example:
module_depends_on = [ google_network.network ]
-
folder
: (Requiredstring
)The resource name of the folder the policy is attached to. Its format is
folders/{folder_id}
. -
role
: (Optionalstring
)The role that should be applied. Only one google_folder_iam_binding can be used per role. Note that custom roles must be of the format
organizations/{{org_id}}/roles/{{role_id}}
. -
members
: (Optionalset(string)
)Identities that will be granted the privilege in role. Each entry can have one of the following values:
user:{emailid}
: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.serviceAccount:{emailid}
: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.group:{emailid}
: An email address that represents a Google group. For example, admins@example.com.domain:{domain}
: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.computed:{identifier}
: An existing key from var.computed_members_map.
Default is
[]
. -
computed_members_map
: (Optionalmap(string)
)A map of members to replace in
var.members
or in members ofvar.policy_bindings
to handle terraform computed values.Default is
{}
.Example:
computed_members_map = { myserviceaccount = "serviceAccount:example@mail.com" }
-
authoritative
: (Optionalbool
)Whether to exclusively set
(authoritative mode)
or add(non-authoritative/additive mode)
members to the role.Default is
true
. -
condition
: (Optionalobject(condition)
)An IAM Condition for a given binding.
The
condition
object accepts the following attributes:-
expression
: (Requiredstring
)Textual representation of an expression in Common Expression Language syntax.
-
title
: (Requiredstring
)A title for the expression, i.e. a short string describing its purpose.
-
description
: (Optionalstring
)An optional description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
-
-
policy_bindings
: (Optionallist(policy_binding)
)A list of IAM policy bindings.
Example:
policy_bindings = [{ role = "roles/viewer" members = ["user:member@example.com"] }]
Each
policy_binding
object in the list accepts the following attributes:-
role
: (Requiredstring
)The role that should be applied.
-
members
: (Optionalset(string)
)Identities that will be granted the privilege in
role
.Default is
var.members
. -
condition
: (Optionalobject(condition)
)An IAM Condition for a given binding.
Example:
condition = { expression = "request.time < timestamp(\"2022-01-01T00:00:00Z\")" title = "expires_after_2021_12_31" }
The
condition
object accepts the following attributes:-
expression
: (Requiredstring
)Textual representation of an expression in Common Expression Language syntax.
-
title
: (Requiredstring
)A title for the expression, i.e. a short string describing its purpose.
-
description
: (Optionalstring
)An optional description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
-
-
-
audit_configs
: (Optionalobject(audit_config)
)List of audit logs settings to be enabled.
Example:
# Enable full audit log coverage for all services audit_configs = [ { service = "allServices" configs = [ { log_type = "DATA_READ" }, { log_type = "DATA_WRITE" }, { log_type = "ADMIN_READ" }, ] } ]
The
audit_config
object accepts the following attributes:-
service
: (Requiredstring
)Service which will be enabled for audit logging.
The special value
allServices
covers all services. Note that if there areaudit_configs
covering bothallServices
and a specific service then the union of the twoaudit_configs
is used for that service: thelog_types
specified in eachaudit_log_config
are enabled, and theexempted_members
in eachaudit_log_config
are exempted. -
audit_log_configs
: (Requiredlist(audit_log_config)
)A list of logging configurations for each type of permission.
Example:
audit_log_configs = [{ log_type = "ADMIN_READ" exempted_members = [ "user:example@example.com" ] }, { log_type = "DATA_WRITE" }]
Each
audit_log_config
object in the list accepts the following attributes:-
log_type
: (Requiredstring
)Permission type for which logging is to be configured. Must be one of
DATA_READ
,DATA_WRITE
, orADMIN_READ
. -
exempted_members
: (Optionalset(string)
)Identities that do not cause logging for this type of permission. The format is the same as that for
var.members
.
-
-
The following attributes are exported in the outputs of the module:
-
module_enabled
: (bool
)Whether this module is enabled.
-
iam
: (object(iam)
)All attributes of the created
iam_binding
oriam_member
oriam_policy
resource according to the mode.
This Module follows the principles of Semantic Versioning (SemVer).
Given a version number MAJOR.MINOR.PATCH
, we increment the:
MAJOR
version when we make incompatible changes,MINOR
version when we add functionality in a backwards compatible manner, andPATCH
version when we make backwards compatible bug fixes.
- Backwards compatibility in versions
0.0.z
is not guaranteed whenz
is increased. (Initial development) - Backwards compatibility in versions
0.y.z
is not guaranteed wheny
is increased. (Pre-release)
Mineiros is a remote-first company headquartered in Berlin, Germany that solves development, automation and security challenges in cloud infrastructure.
Our vision is to massively reduce time and overhead for teams to manage and deploy production-grade and secure cloud infrastructure.
We offer commercial support for all of our modules and encourage you to reach out if you have any questions or need help. Feel free to email us at hello@mineiros.io or join our Community Slack channel.
We use GitHub Issues to track community reported issues and missing features.
Contributions are always encouraged and welcome! For the process of accepting changes, we use Pull Requests. If you'd like more information, please see our Contribution Guidelines.
This repository comes with a handy Makefile.
Run make help
to see details on each available target.
This module is licensed under the Apache License Version 2.0, January 2004. Please see LICENSE for full details.
Copyright © 2020-2022 Mineiros GmbH