terraform { required_providers { google = { source = "hashicorp/google" version = "6.36.0" } } } provider "google" { project = var.project_id region = var.region zone = var.zone } locals { sa_name = var.name_prefix == "" ? var.service_account_id : "${var.name_prefix}-sa" sa_vm_name = var.name_prefix == "" ? "${var.service_account_id}-vm" : "${var.name_prefix}-sa-vm" } resource "google_service_account" "vm" { account_id = local.sa_vm_name display_name = "Constellation service account for VMs" description = "Service account used by the VMs" } resource "google_service_account" "service_account" { account_id = local.sa_name display_name = "Constellation service account" description = "Service account used inside Constellation" } // service_account creation is eventually consistent so add a delay to ensure it is created before the next step: https://registry.terraform.io/providers/hashicorp/google/4.69.1/docs/resources/google_service_account.html resource "null_resource" "delay" { provisioner "local-exec" { command = "sleep 15" } triggers = { "service_account" = "${google_service_account.service_account.id}" } } resource "google_project_iam_member" "instance_admin_role" { project = var.project_id role = "roles/compute.instanceAdmin.v1" member = "serviceAccount:${google_service_account.service_account.email}" depends_on = [null_resource.delay] } resource "google_project_iam_member" "network_admin_role" { project = var.project_id role = "roles/compute.networkAdmin" member = "serviceAccount:${google_service_account.service_account.email}" depends_on = [null_resource.delay] } resource "google_project_iam_member" "security_admin_role" { project = var.project_id role = "roles/compute.securityAdmin" member = "serviceAccount:${google_service_account.service_account.email}" depends_on = [null_resource.delay] } resource "google_project_iam_member" "storage_admin_role" { project = var.project_id role = "roles/compute.storageAdmin" member = "serviceAccount:${google_service_account.service_account.email}" depends_on = [null_resource.delay] } resource "google_project_iam_member" "iam_service_account_user_role" { project = var.project_id role = "roles/iam.serviceAccountUser" member = "serviceAccount:${google_service_account.service_account.email}" depends_on = [null_resource.delay] } resource "google_project_iam_custom_role" "vm" { # role_id must not contain dashes role_id = replace("${local.sa_vm_name}-role", "-", "_") title = "Constellation IAM role for VMs" description = "Constellation IAM role for VMs" permissions = [ "compute.instances.get", "compute.instances.list", "compute.subnetworks.get", "compute.globalForwardingRules.list", "compute.zones.list", "compute.forwardingRules.list", ] } resource "google_project_iam_binding" "custom_role_vm_to_service_account_vm" { project = var.project_id role = "projects/${var.project_id}/roles/${google_project_iam_custom_role.vm.role_id}" members = [ "serviceAccount:${google_service_account.vm.email}", ] depends_on = [null_resource.delay] } resource "google_service_account_key" "service_account_key" { service_account_id = google_service_account.service_account.name depends_on = [null_resource.delay] }