-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmain.tf
77 lines (68 loc) · 2.84 KB
/
main.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
# provider 設定
terraform {
required_providers {
google = {
source = "hashicorp/google"
version = ">= 4.0.0"
}
}
required_version = ">= 1.3.0"
backend "gcs" {
bucket = "wif_terraform_tfstate"
prefix = "terraform/state"
}
}
## API の有効化(Workload Identity 用)
resource "google_project_service" "enable_api" {
for_each = local.services
project = local.project_id
service = each.value
disable_dependent_services = true
}
# wif正しく実行するために、terraform用のsaに以下の権限を付与する必要があります
resource "google_project_iam_member" "terraform_sa_role" {
for_each = toset([
"roles/storage.admin", // Terraform state
"roles/resourcemanager.projectIamAdmin", // retrieving IAM policy 403 error
"roles/serviceusage.serviceUsageViewer", // serviceusage.services.list on cloudresourcemanager denied
"roles/iam.serviceAccountViewer", // iam.serviceAccounts.get denied
"roles/iam.workloadIdentityPoolAdmin" // iam.workloadIdentityPools.get denied
])
project = local.project_id
role = each.value
member = "serviceAccount:${data.google_service_account.terraform-sa.email}"
}
# Workload Identity Pool 設定
resource "google_iam_workload_identity_pool" "my-wif-pool" {
provider = google-beta
project = local.project_id
workload_identity_pool_id = "my-wif-pool"
display_name = "my-wif-pool"
description = "GitHub Actions で使用"
}
# Workload Identity Provider 設定
resource "google_iam_workload_identity_pool_provider" "my-wif-provider" {
provider = google-beta
project = local.project_id
workload_identity_pool_id = google_iam_workload_identity_pool.my-wif-pool.workload_identity_pool_id
workload_identity_pool_provider_id = "my-wif-provider"
display_name = "my-wif-provider"
description = "GitHub Actions で使用"
attribute_mapping = {
"google.subject" = "assertion.sub"
"attribute.repository" = "assertion.repository"
}
oidc {
issuer_uri = "https://token.actions.githubusercontent.com"
}
}
# GitHub Actions が借用するサービスアカウント
data "google_service_account" "terraform-sa" {
account_id = local.terraform_service_account
}
# サービスアカウントの IAM Policy 設定と GitHub リポジトリの指定
resource "google_service_account_iam_member" "terraform_sa" {
service_account_id = data.google_service_account.terraform-sa.id
role = "roles/iam.workloadIdentityUser"
member = "principalSet://iam.googleapis.com/${google_iam_workload_identity_pool.my-wif-pool.name}/attribute.repository/${local.github_repository}"
}