forked from pierront/but3-iac
test
This commit is contained in:
@@ -1,51 +1,33 @@
|
||||
############################################
|
||||
# 1. VPC PERSONNALISÉ
|
||||
############################################
|
||||
|
||||
resource "google_compute_network" "vpc" {
|
||||
name = "${var.project_name}-vpc"
|
||||
resource "google_compute_network" "vpc_terraform" {
|
||||
name = "vpc-terraform"
|
||||
auto_create_subnetworks = false
|
||||
}
|
||||
|
||||
provider "google" {
|
||||
project = var.project_name
|
||||
region = var.region
|
||||
}
|
||||
|
||||
############################################
|
||||
# 2. SOUS-RÉSEAUX
|
||||
############################################
|
||||
|
||||
resource "google_compute_subnetwork" "frontend" {
|
||||
name = "${var.project_name}-frontend-subnet"
|
||||
resource "google_compute_subnetwork" "subnet_frontend" {
|
||||
name = "frontend"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
ip_cidr_range = var.frontend_cidr
|
||||
region = var.region
|
||||
network = google_compute_network.vpc.id
|
||||
}
|
||||
|
||||
resource "google_compute_subnetwork" "backend" {
|
||||
name = "${var.project_name}-backend-subnet"
|
||||
resource "google_compute_subnetwork" "subnet_backend" {
|
||||
name = "backend"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
ip_cidr_range = var.backend_cidr
|
||||
region = var.region
|
||||
network = google_compute_network.vpc.id
|
||||
}
|
||||
|
||||
resource "google_compute_subnetwork" "database" {
|
||||
name = "${var.project_name}-database-subnet"
|
||||
resource "google_compute_subnetwork" "subnet_database" {
|
||||
name = "database"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
ip_cidr_range = var.database_cidr
|
||||
region = var.region
|
||||
network = google_compute_network.vpc.id
|
||||
}
|
||||
|
||||
|
||||
############################################
|
||||
# 3. FIREWALL RULES
|
||||
############################################
|
||||
|
||||
# HTTP / HTTPS vers frontend
|
||||
resource "google_compute_firewall" "frontend_http_https" {
|
||||
name = "${var.project_name}-frontend-http-https"
|
||||
network = google_compute_network.vpc.name
|
||||
resource "google_compute_firewall" "allow_user_frontend" {
|
||||
name = "allow-user-frontend"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
@@ -53,31 +35,12 @@ resource "google_compute_firewall" "frontend_http_https" {
|
||||
}
|
||||
|
||||
source_ranges = ["0.0.0.0/0"]
|
||||
|
||||
target_tags = ["frontend"]
|
||||
target_tags = ["frontend"]
|
||||
}
|
||||
|
||||
|
||||
# SSH depuis les IP autorisées
|
||||
resource "google_compute_firewall" "ssh_access" {
|
||||
name = "${var.project_name}-ssh"
|
||||
network = google_compute_network.vpc.name
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
ports = ["22"]
|
||||
}
|
||||
|
||||
source_ranges = [var.ssh_source_ranges]
|
||||
|
||||
target_tags = ["frontend", "backend", "database"]
|
||||
}
|
||||
|
||||
|
||||
# Port 8000 du frontend vers backend
|
||||
resource "google_compute_firewall" "frontend_to_backend" {
|
||||
name = "${var.project_name}-frontend-to-backend"
|
||||
network = google_compute_network.vpc.name
|
||||
resource "google_compute_firewall" "allow_frontend_backend" {
|
||||
name = "allow-frontend-backend"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
@@ -85,14 +48,25 @@ resource "google_compute_firewall" "frontend_to_backend" {
|
||||
}
|
||||
|
||||
source_tags = ["frontend"]
|
||||
target_tags = ["backend"]
|
||||
target_tags = ["backend"]
|
||||
}
|
||||
|
||||
resource "google_compute_firewall" "allow_ssh_all" {
|
||||
name = "allow-ssh-all"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
|
||||
# Port 3306 du backend vers database
|
||||
resource "google_compute_firewall" "backend_to_database" {
|
||||
name = "${var.project_name}-backend-to-database"
|
||||
network = google_compute_network.vpc.name
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
ports = ["22"]
|
||||
}
|
||||
|
||||
source_ranges = ["0.0.0.0/0"]
|
||||
target_tags = ["ssh"]
|
||||
}
|
||||
|
||||
resource "google_compute_firewall" "allow_backend_database" {
|
||||
name = "allow-backend-database"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
@@ -100,5 +74,5 @@ resource "google_compute_firewall" "backend_to_database" {
|
||||
}
|
||||
|
||||
source_tags = ["backend"]
|
||||
target_tags = ["database"]
|
||||
}
|
||||
target_tags = ["database"]
|
||||
}
|
||||
@@ -1,22 +1,12 @@
|
||||
############################################
|
||||
# 1. ID du VPC
|
||||
############################################
|
||||
|
||||
output "vpc_id" {
|
||||
description = "ID du VPC créé."
|
||||
value = google_compute_network.vpc.id
|
||||
output "vpc" {
|
||||
value = google_compute_network.vpc_terraform.id
|
||||
}
|
||||
|
||||
|
||||
############################################
|
||||
# 2. IDs des sous-réseaux (map)
|
||||
############################################
|
||||
|
||||
output "subnet_ids" {
|
||||
description = "Map des IDs des sous-réseaux : frontend, backend, database."
|
||||
value = {
|
||||
frontend = google_compute_subnetwork.frontend.id
|
||||
backend = google_compute_subnetwork.backend.id
|
||||
database = google_compute_subnetwork.database.id
|
||||
}
|
||||
}
|
||||
output "subnets" {
|
||||
value = {
|
||||
frontend = google_compute_subnetwork.subnet_frontend.id
|
||||
backend = google_compute_subnetwork.subnet_backend.id
|
||||
database = google_compute_subnetwork.subnet_database.id
|
||||
}
|
||||
}
|
||||
@@ -1,35 +1,30 @@
|
||||
|
||||
variable "project_name" {
|
||||
description = "Nom du projet"
|
||||
type = string
|
||||
description = "Nom du projet."
|
||||
default = "ok"
|
||||
}
|
||||
|
||||
variable "region" {
|
||||
description = "Region du projet"
|
||||
type = string
|
||||
description = "Région où seront déployées les ressources réseau."
|
||||
default = "europe-west9-b"
|
||||
}
|
||||
|
||||
variable "frontend_cidr" {
|
||||
description = "CIDR for frontend subnet"
|
||||
type = string
|
||||
description = "CIDR du sous-réseau frontend."
|
||||
default = "10.0.1.0/24"
|
||||
}
|
||||
|
||||
variable "backend_cidr" {
|
||||
description = "CIDR for backend subnet"
|
||||
type = string
|
||||
description = "CIDR du sous-réseau backend."
|
||||
default = "10.0.2.0/24"
|
||||
}
|
||||
|
||||
variable "database_cidr" {
|
||||
description = "CIDR for database subnet"
|
||||
type = string
|
||||
description = "CIDR du sous-réseau base de données."
|
||||
default = "10.0.3.0/24"
|
||||
}
|
||||
|
||||
variable "ssh_source_ranges" {
|
||||
description = ""
|
||||
type = string
|
||||
description = "Plages d’adresses autorisées pour l’accès SSH."
|
||||
default = "0.0.0.0/0"
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user