You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| access\_level\_name | Access level name of the Access Policy. |`string`|`"terraform_members_e"`| no |
24
+
| access\_level\_name\_dry\_run | Access level name of the Access Policy in Dry-run mode. |`string`|`"terraform_members_e_dry_run"`| no |
24
25
| buckets\_names | Buckets Names as list of strings |`list(string)`| <pre>[<br> "bucket1-e",<br> "bucket2-e"<br>]</pre> | no |
25
26
| buckets\_prefix | Bucket Prefix |`string`|`"test-bucket-e"`| no |
26
27
| members | An allowed list of members (users, service accounts). The signed-in identity originating the request must be a part of one of the provided members. If not specified, a request may come from any user (logged in/not logged in, etc.). Formats: user:{emailid}, serviceAccount:{emailid} |`list(string)`| n/a | yes |
| access\_level\_name | Access level name of the Access Policy. |`string`|`"terraform_members"`| no |
24
+
| access\_level\_name\_dry\_run | Access level name of the Access Policy in Dry-run mode. |`string`|`"terraform_members_dry_run"`| no |
24
25
| buckets\_names | Buckets Names as list of strings |`list(string)`| <pre>[<br> "bucket1",<br> "bucket2"<br>]</pre> | no |
25
26
| buckets\_prefix | Bucket Prefix |`string`|`"test-bucket"`| no |
26
27
| members | An allowed list of members (users, service accounts). The signed-in identity originating the request must be a part of one of the provided members. If not specified, a request may come from any user (logged in/not logged in, etc.). Formats: user:{emailid}, serviceAccount:{emailid} |`list(string)`| n/a | yes |
| description | Description of the regular perimeter |`string`| n/a | yes |
101
101
| egress\_policies | A list of all [egress policies](https://cloud.google.com/vpc-service-controls/docs/ingress-egress-rules#egress-rules-reference), each list object has a `from` and `to` value that describes egress\_from and egress\_to.<br><br>Example: `[{ from={ identities=[], identity_type="ID_TYPE" }, to={ resources=[], operations={ "SRV_NAME"={ OP_TYPE=[] }}}}]`<br><br>Valid Values:<br>`ID_TYPE` = `null` or `IDENTITY_TYPE_UNSPECIFIED` (only allow indentities from list); `ANY_IDENTITY`; `ANY_USER_ACCOUNT`; `ANY_SERVICE_ACCOUNT`<br>`SRV_NAME` = "`*`" (allow all services) or [Specific Services](https://cloud.google.com/vpc-service-controls/docs/supported-products#supported_products)<br>`OP_TYPE` = [methods](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions) or [permissions](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions) | <pre>list(object({<br> title = optional(string, null)<br> from = object({<br> sources = optional(object({<br> resources = optional(list(string), [])<br> access_levels = optional(list(string), [])<br> }), {}),<br> identity_type = optional(string, null)<br> identities = optional(list(string), null)<br> })<br> to = object({<br> operations = optional(map(object({<br> methods = optional(list(string), [])<br> permissions = optional(list(string), [])<br> })), {}),<br> roles = optional(list(string), null)<br> resources = optional(list(string), ["*"])<br> external_resources = optional(list(string), [])<br> })<br> }))</pre> | `[]` | no |
102
102
| egress\_policies\_dry\_run | A list of all [egress policies](https://cloud.google.com/vpc-service-controls/docs/ingress-egress-rules#egress-rules-reference), each list object has a `from` and `to` value that describes egress\_from and egress\_to. Use same formatting as `egress_policies`. | <pre>list(object({<br> title = optional(string, null)<br> from = object({<br> sources = optional(object({<br> resources = optional(list(string), [])<br> access_levels = optional(list(string), [])<br> }), {}),<br> identity_type = optional(string, null)<br> identities = optional(list(string), null)<br> })<br> to = object({<br> operations = optional(map(object({<br> methods = optional(list(string), [])<br> permissions = optional(list(string), [])<br> })), {}),<br> roles = optional(list(string), null)<br> resources = optional(list(string), ["*"])<br> external_resources = optional(list(string), [])<br> })<br> }))</pre> | `[]` | no |
103
+
| egress\_policies\_keys | A list of keys to use for the Terraform state. The order should correspond to var.egress\_policies and the keys must not be dynamically computed. If `null`, var.egress\_policies will be used as keys. |`list(string)`|`null`| no |
104
+
| egress\_policies\_keys\_dry\_run | (Dry-run) A list of keys to use for the Terraform state. The order should correspond to var.egress\_policies\_dry\_run and the keys must not be dynamically computed. If `null`, var.egress\_policies\_dry\_run will be used as keys. |`list(string)`|`null`| no |
103
105
| ingress\_policies | A list of all [ingress policies](https://cloud.google.com/vpc-service-controls/docs/ingress-egress-rules#ingress-rules-reference), each list object has a `from` and `to` value that describes ingress\_from and ingress\_to.<br><br>Example: `[{ from={ sources={ resources=[], access_levels=[] }, identities=[], identity_type="ID_TYPE" }, to={ resources=[], operations={ "SRV_NAME"={ OP_TYPE=[] }}}}]`<br><br>Valid Values:<br>`ID_TYPE` = `null` or `IDENTITY_TYPE_UNSPECIFIED` (only allow indentities from list); `ANY_IDENTITY`; `ANY_USER_ACCOUNT`; `ANY_SERVICE_ACCOUNT`<br>`SRV_NAME` = "`*`" (allow all services) or [Specific Services](https://cloud.google.com/vpc-service-controls/docs/supported-products#supported_products)<br>`OP_TYPE` = [methods](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions) or [permissions](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions) | <pre>list(object({<br> title = optional(string, null)<br> from = object({<br> sources = optional(object({<br> resources = optional(list(string), [])<br> access_levels = optional(list(string), [])<br> }), {}),<br> identity_type = optional(string, null)<br> identities = optional(list(string), null)<br> })<br> to = object({<br> operations = optional(map(object({<br> methods = optional(list(string), [])<br> permissions = optional(list(string), [])<br> })), {}),<br> roles = optional(list(string), null)<br> resources = optional(list(string), ["*"])<br> })<br> }))</pre> | `[]` | no |
104
106
| ingress\_policies\_dry\_run | A list of all [ingress policies](https://cloud.google.com/vpc-service-controls/docs/ingress-egress-rules#ingress-rules-reference), each list object has a `from` and `to` value that describes ingress\_from and ingress\_to. Use same formatting as `ingress_policies`. | <pre>list(object({<br> title = optional(string, null)<br> from = object({<br> sources = optional(object({<br> resources = optional(list(string), [])<br> access_levels = optional(list(string), [])<br> }), {}),<br> identity_type = optional(string, null)<br> identities = optional(list(string), null)<br> })<br> to = object({<br> operations = optional(map(object({<br> methods = optional(list(string), [])<br> permissions = optional(list(string), [])<br> })), {}),<br> roles = optional(list(string), null)<br> resources = optional(list(string), ["*"])<br> })<br> }))</pre> |`[]`| no |
107
+
| ingress\_policies\_keys | A list of keys to use for the Terraform state. The order should correspond to var.ingress\_policies and the keys must not be dynamically computed. If `null`, var.ingress\_policies will be used as keys. |`list(string)`|`null`| no |
108
+
| ingress\_policies\_keys\_dry\_run | (Dry-run) A list of keys to use for the Terraform state. The order should correspond to var.ingress\_policies\_dry\_run and the keys must not be dynamically computed. If `null`, var.ingress\_policies\_dry\_run will be used as keys. |`list(string)`|`null`| no |
105
109
| perimeter\_name | Name of the perimeter. Should be one unified string. Must only be letters, numbers and underscores |`string`| n/a | yes |
106
110
| policy | Name of the parent policy |`string`| n/a | yes |
107
111
| resource\_keys | A list of keys to use for the Terraform state. The order should correspond to var.resources and the keys must not be dynamically computed. If `null`, var.resources will be used as keys. |`list(string)`|`null`| no |
108
-
| resource\_keys\_dry\_run | A list of keys to use for the Terraform state. The order should correspond to var.resources\_dry\_run and the keys must not be dynamically computed. If `null`, var.resources\_dry\_run will be used as keys. |`list(string)`|`null`| no |
112
+
| resource\_keys\_dry\_run |(Dry-run) A list of keys to use for the Terraform state. The order should correspond to var.resources\_dry\_run and the keys must not be dynamically computed. If `null`, var.resources\_dry\_run will be used as keys. |`list(string)`|`null`| no |
109
113
| resources | A list of GCP resources that are inside of the service perimeter. Currently only projects and VPC networks are allowed. |`list(string)`|`[]`| no |
110
114
| resources\_dry\_run | (Dry-run) A list of GCP resources that are inside of the service perimeter. Currently only projects and VPC networks are allowed. If set, a dry-run policy will be set. |`list(string)`|`[]`| no |
111
115
| restricted\_services | GCP services that are subject to the Service Perimeter restrictions. Must contain a list of services. For example, if storage.googleapis.com is specified, access to the storage buckets inside the perimeter must meet the perimeter's access restrictions. |`list(string)`|`[]`| no |
Copy file name to clipboardExpand all lines: modules/regular_service_perimeter/variables.tf
+25-1Lines changed: 25 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,31 @@ variable "resources_dry_run" {
66
66
}
67
67
68
68
variable"resource_keys_dry_run" {
69
-
description="A list of keys to use for the Terraform state. The order should correspond to var.resources_dry_run and the keys must not be dynamically computed. If `null`, var.resources_dry_run will be used as keys."
69
+
description="(Dry-run) A list of keys to use for the Terraform state. The order should correspond to var.resources_dry_run and the keys must not be dynamically computed. If `null`, var.resources_dry_run will be used as keys."
70
+
type=list(string)
71
+
default=null
72
+
}
73
+
74
+
variable"ingress_policies_keys" {
75
+
description="A list of keys to use for the Terraform state. The order should correspond to var.ingress_policies and the keys must not be dynamically computed. If `null`, var.ingress_policies will be used as keys."
76
+
type=list(string)
77
+
default=null
78
+
}
79
+
80
+
variable"egress_policies_keys" {
81
+
description="A list of keys to use for the Terraform state. The order should correspond to var.egress_policies and the keys must not be dynamically computed. If `null`, var.egress_policies will be used as keys."
82
+
type=list(string)
83
+
default=null
84
+
}
85
+
86
+
variable"ingress_policies_keys_dry_run" {
87
+
description="(Dry-run) A list of keys to use for the Terraform state. The order should correspond to var.ingress_policies_dry_run and the keys must not be dynamically computed. If `null`, var.ingress_policies_dry_run will be used as keys."
88
+
type=list(string)
89
+
default=null
90
+
}
91
+
92
+
variable"egress_policies_keys_dry_run" {
93
+
description="(Dry-run) A list of keys to use for the Terraform state. The order should correspond to var.egress_policies_dry_run and the keys must not be dynamically computed. If `null`, var.egress_policies_dry_run will be used as keys."
0 commit comments