-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathmain.tf
More file actions
137 lines (124 loc) · 4.31 KB
/
main.tf
File metadata and controls
137 lines (124 loc) · 4.31 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
resource "null_resource" "execute_cloud_sql_proxy" {
for_each = (((var.cloudsql_proxy_host == "localhost" || var.cloudsql_proxy_host == "127.0.0.1") && var.terraform_start_cloud_sql_proxy) ? {
for u in var.database_and_user_list : u.user => u
} : {})
lifecycle {
replace_triggered_by = [
null_resource.force_permissions_refresh.id
]
}
provisioner "local-exec" {
command = "${path.module}/scripts/execute_cloud_sql_proxy.sh"
environment = {
CLOUDSDK_CORE_PROJECT = var.project_id
CLOUDSQL_PROXY_HOST = var.cloudsql_proxy_host
CLOUDSQL_PROXY_PORT = var.cloudsql_proxy_port
GCLOUD_PROJECT_REGION = var.region
CLOUDSQL_INSTANCE_NAME = var.cloudsql_instance_name
}
interpreter = [
"/bin/sh", "-c"
]
}
}
# Retrieve Cloud SQL instance information (database type) with a data resource.
data "google_sql_database_instance" "cloudsql_instance" {
name = var.cloudsql_instance_name
project = var.project_id
lifecycle {
postcondition {
condition = startswith(self.database_version, "MYSQL_5_7") || startswith(self.database_version, "MYSQL_8_0") || startswith(self.database_version, "MYSQL_8_4")
error_message = "Database version must be \"MYSQL_5_7\" or \"MYSQL_8_0\" or \"MYSQL_8_4\". Other versions are not supported."
}
}
}
# Generate a random password for each created user.
resource "random_password" "sql_user_password" {
for_each = { for u in var.database_and_user_list : u.user => u }
length = 16
special = true
override_special = "_~@"
}
# Create the databases.
resource "google_sql_database" "sql_database" {
project = var.project_id
for_each = { for d in var.database_and_user_list : d.database => d }
name = each.value.database
instance = var.cloudsql_instance_name
}
# Create the database users.
resource "google_sql_user" "sql_user" {
project = var.project_id
for_each = { for u in var.database_and_user_list : u.user => u }
instance = var.cloudsql_instance_name
name = each.value.user
password = random_password.sql_user_password[each.value.user].result
host = each.value.user_host
depends_on = [
google_sql_database.sql_database
]
}
resource "null_resource" "force_permissions_refresh" {
triggers = {
refresh_id = var.permissions_refresh_id
}
}
resource "null_resource" "grant_permissions" {
for_each = { for u in var.database_and_user_list : u.user => u }
triggers = {
user = each.key
user_host = each.value.user_host
database = each.value.database
}
lifecycle {
replace_triggered_by = [
null_resource.force_permissions_refresh.id
]
}
provisioner "local-exec" {
command = "${path.module}/scripts/execute_sql.sh"
environment = {
CLOUDSDK_CORE_PROJECT = var.project_id
GCLOUD_PROJECT_REGION = var.region
CLOUDSQL_INSTANCE_NAME = var.cloudsql_instance_name
CLOUDSQL_PROXY_HOST = var.cloudsql_proxy_host
CLOUDSQL_PROXY_PORT = var.cloudsql_proxy_port
CLOUDSQL_PRIVILEGED_USER_NAME = var.cloudsql_privileged_user_name
CLOUDSQL_PRIVILEGED_USER_PASSWORD = var.cloudsql_privileged_user_password
MYSQL_VERSION = data.google_sql_database_instance.cloudsql_instance.database_version
USER = each.value.user
USER_HOST = each.value.user_host
DATABASE = each.value.database
}
interpreter = [
"/bin/sh", "-c"
]
}
depends_on = [
google_sql_database.sql_database,
google_sql_user.sql_user,
null_resource.execute_cloud_sql_proxy
]
}
resource "null_resource" "kill_cloud_sql_proxy" {
for_each = (((var.cloudsql_proxy_host == "localhost" || var.cloudsql_proxy_host == "127.0.0.1") && var.terraform_start_cloud_sql_proxy) ? {
for u in var.database_and_user_list : u.user => u
} : {})
lifecycle {
replace_triggered_by = [
null_resource.force_permissions_refresh.id
]
}
provisioner "local-exec" {
command = "${path.module}/scripts/kill_cloud_sql_proxy.sh"
interpreter = [
"/bin/sh", "-c"
]
when = create
}
depends_on = [
google_sql_database.sql_database,
google_sql_user.sql_user,
null_resource.grant_permissions
]
}