mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-28 17:09:30 -05:00
913b09aeb8
* terraform: enable creation of SEV-SNP VMs on GCP * variant: add SEV-SNP attestation variant * config: add SEV-SNP config options for GCP * measurements: add GCP SEV-SNP measurements * gcp: separate package for SEV-ES * attestation: add GCP SEV-SNP attestation logic * gcp: factor out common logic * choose: add GCP SEV-SNP * cli: add TF variable passthrough for GCP SEV-SNP variables * cli: support GCP SEV-SNP for `constellation verify` * Adjust usage of GCP SEV-SNP throughout codebase * ci: add GCP SEV-SNP * terraform-provider: support GCP SEV-SNP * docs: add GCP SEV-SNP reference * linter fixes * gcp: only run test with TPM simulator * gcp: remove nonsense test * Update cli/internal/cmd/verify.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update docs/docs/overview/clouds.md Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update terraform-provider-constellation/internal/provider/attestation_data_source_test.go Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com> * linter fixes * terraform_provider: correctly pass down CC technology * config: mark attestationconfigapi as unimplemented * gcp: fix comments and typos * snp: use nonce and PK hash in SNP report * snp: ensure we never use ARK supplied by Issuer (#3025) * Make sure SNP ARK is always loaded from config, or fetched from AMD KDS * GCP: Set validator `reportData` correctly --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Co-authored-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * attestationconfigapi: add GCP to uploading * snp: use correct cert Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * terraform-provider: enable fetching of attestation config values for GCP SEV-SNP * linter fixes --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com>
72 lines
2.2 KiB
HCL
72 lines
2.2 KiB
HCL
terraform {
|
|
required_providers {
|
|
google = {
|
|
source = "hashicorp/google"
|
|
version = "5.23.0"
|
|
}
|
|
}
|
|
}
|
|
|
|
provider "google" {
|
|
project = var.project_id
|
|
region = var.region
|
|
zone = var.zone
|
|
}
|
|
|
|
resource "google_service_account" "service_account" {
|
|
account_id = var.service_account_id
|
|
display_name = "Constellation service account"
|
|
description = "Service account used inside Constellation"
|
|
}
|
|
|
|
// service_account creation is eventually consistent so add a delay to ensure it is created before the next step: https://registry.terraform.io/providers/hashicorp/google/4.69.1/docs/resources/google_service_account.html
|
|
resource "null_resource" "delay" {
|
|
provisioner "local-exec" {
|
|
command = "sleep 15"
|
|
}
|
|
triggers = {
|
|
"service_account" = "${google_service_account.service_account.id}"
|
|
}
|
|
}
|
|
|
|
|
|
resource "google_project_iam_member" "instance_admin_role" {
|
|
project = var.project_id
|
|
role = "roles/compute.instanceAdmin.v1"
|
|
member = "serviceAccount:${google_service_account.service_account.email}"
|
|
depends_on = [null_resource.delay]
|
|
}
|
|
|
|
resource "google_project_iam_member" "network_admin_role" {
|
|
project = var.project_id
|
|
role = "roles/compute.networkAdmin"
|
|
member = "serviceAccount:${google_service_account.service_account.email}"
|
|
depends_on = [null_resource.delay]
|
|
}
|
|
|
|
resource "google_project_iam_member" "security_admin_role" {
|
|
project = var.project_id
|
|
role = "roles/compute.securityAdmin"
|
|
member = "serviceAccount:${google_service_account.service_account.email}"
|
|
depends_on = [null_resource.delay]
|
|
}
|
|
|
|
resource "google_project_iam_member" "storage_admin_role" {
|
|
project = var.project_id
|
|
role = "roles/compute.storageAdmin"
|
|
member = "serviceAccount:${google_service_account.service_account.email}"
|
|
depends_on = [null_resource.delay]
|
|
}
|
|
|
|
resource "google_project_iam_member" "iam_service_account_user_role" {
|
|
project = var.project_id
|
|
role = "roles/iam.serviceAccountUser"
|
|
member = "serviceAccount:${google_service_account.service_account.email}"
|
|
depends_on = [null_resource.delay]
|
|
}
|
|
|
|
resource "google_service_account_key" "service_account_key" {
|
|
service_account_id = google_service_account.service_account.name
|
|
depends_on = [null_resource.delay]
|
|
}
|