Compare commits

30 Commits
main ... main

Author SHA1 Message Date
aissi
56be687201 Libérable ! 2025-12-04 13:00:32 +01:00
aissi
a2deb7b865 commit 2025-12-04 12:55:35 +01:00
aissi
8fa75558ec commit 2025-12-04 12:18:53 +01:00
aissi
37e88ecbb9 commit 2025-12-04 12:14:50 +01:00
aissi
84aeb66c69 commit 2025-12-04 12:02:46 +01:00
aissi
20d1893b1f commit 2025-12-04 11:59:30 +01:00
aissi
e292f49d99 commit 2025-12-04 11:50:07 +01:00
aissi
deb90640a0 commit 2025-12-04 11:47:35 +01:00
aissi
e4c5e6b05e commit 2025-12-04 11:42:04 +01:00
aissi
437c85d91d commit 2025-12-04 11:39:44 +01:00
aissi
d2918f2c6a commit 2025-12-04 11:36:56 +01:00
aissi
9897b29f8b commit 2025-12-04 11:28:33 +01:00
aissi
9ffcc99ca6 commit 2025-12-04 11:24:05 +01:00
aissi
0a7a83433f commit 2025-12-04 11:01:15 +01:00
aissi
ed14be22c5 re correction 2025-12-04 10:18:38 +01:00
aissi
80494d0c96 re-correction 2025-12-04 10:11:12 +01:00
aissi
17da1128a0 correction ? 2025-12-04 10:08:05 +01:00
aissi
e27fac93e9 commit 2025-12-04 09:54:39 +01:00
aissi
b90b7426dc commit 2025-12-04 09:50:12 +01:00
aissi
876a184bbe j'avais oublié un fichier 2025-12-04 09:40:55 +01:00
aissi
c4d96e512d encore xje sais plus 2025-12-04 09:40:14 +01:00
aissi
3d2e3ab686 encore x7? 2025-12-04 08:56:13 +01:00
aissi
c9c7853792 encore x6 2025-12-03 17:06:12 +01:00
aissi
bca5736344 encore x5 2025-12-03 17:04:11 +01:00
aissi
2821abd4f6 encore encore encore 2025-12-03 16:59:05 +01:00
aissi
af30a84d14 encore encore 2025-12-03 16:54:32 +01:00
aissi
b1d2989ef8 encore 2025-12-03 16:51:28 +01:00
aissi
0a47519f21 test 2025-12-03 16:46:11 +01:00
aissi
f6daa09e66 new test 2025-12-03 16:17:19 +01:00
aissi
68299b278a commit de test 2025-12-03 16:10:30 +01:00
14 changed files with 1013 additions and 0 deletions

View File

@@ -0,0 +1,40 @@
terraform {
required_providers {
google = {
source = "hashicorp/google"
version = "~> 6.12.0"
}
}
}
provider "google" {
project = var.project_id
region = var.region
}
module "network" {
source = "../../modules/network"
project_name = var.project_name
region = var.region
frontend_cidr = var.frontend_cidr
backend_cidr = var.backend_cidr
database_cidr = var.database_cidr
ssh_source_ranges = var.ssh_source_ranges
}
module "compute" {
source = "../../modules/compute"
instance_type = var.instance_type
zone = var.zone
frontend_subnet_id = module.network.subnets.frontend
backend_subnet_id = module.network.subnets.backend
database_subnet_id = module.network.subnets.backend
}
module "iam" {
source = "../../modules/iam"
project_id = var.project_id
}

View File

@@ -0,0 +1,28 @@
output "ip_internes" {
value = module.compute.ip_internes
}
output "ip_public_frontend" {
value = module.compute.ip_public_frontend
}
output "nom_instances" {
value = module.compute.nom_instances
}
output "service_account_email" {
value = module.iam.service_account_email
}
output "service_account_key" {
sensitive = true
value = module.iam.service_account_key
}
output "vpc" {
value = module.network.vpc_terraform_output
}
output "subnets" {
value = module.network.subnets
}

View File

@@ -0,0 +1,70 @@
variable "instance_type" {
description = "type de l'instance"
type = string
default = "e2-small"
}
variable "zone" {
description = "région"
type = string
default = "europe-west1-b"
}
variable "project_id" {
description = "ID du projet GCP dans lequel appliquer les règles IAM"
type = string
default = "gifted-chimera-424007-g1"
}
variable "project_name" {
description = "Nom du projet"
type = string
default = "My First Project"
}
variable "region" {
description = "Région"
type = string
default = "europe-west1"
}
variable "frontend_cidr" {
description = "CIDR du frontend"
type = string
default = "10.0.1.0/24"
}
variable "backend_cidr" {
description = "CIDR du backend"
type = string
default = "10.0.2.0/24"
}
variable "database_cidr" {
description = "CIDR de la database"
type = string
default = "10.0.3.0/24"
}
variable "ssh_source_ranges" {
description = "Plages IP autorisées pour SSH"
type = string
default = "0.0.0.0/0"
}

View File

@@ -0,0 +1,81 @@
# Instance front-end
resource "google_compute_instance" "frontend_vm" {
name = "frontend-vm"
machine_type = var.instance_type
zone = var.zone
boot_disk {
initialize_params {
image = "debian-cloud/debian-11"
size = 10
}
}
network_interface {
access_config {} # IP publique
subnetwork = var.frontend_subnet_id
# IP publique
}
tags = ["frontend", "ssh"]
metadata = {
enable-oslogin = "TRUE"
}
}
# Instance back-end
resource "google_compute_instance" "backend_vm" {
name = "backend-vm"
machine_type = var.instance_type
zone = var.zone
boot_disk {
initialize_params {
image = "debian-cloud/debian-11"
size = 10
}
}
network_interface {
subnetwork = var.backend_subnet_id
}
tags = ["backend", "ssh"]
metadata = {
enable-oslogin = "TRUE"
}
}
# Instance data-base
resource "google_compute_instance" "database_vm" {
name = "database-vm"
machine_type = var.instance_type
zone = var.zone
boot_disk {
initialize_params {
image = "debian-cloud/debian-11"
size = 20
}
}
network_interface {
subnetwork = var.database_subnet_id
}
tags = ["database", "ssh"]
metadata = {
enable-oslogin = "TRUE"
}
}

View File

@@ -0,0 +1,19 @@
output "ip_internes" {
value = {
frontend = google_compute_instance.frontend_vm.network_interface[0].network_ip
backend = google_compute_instance.backend_vm.network_interface[0].network_ip
database = google_compute_instance.database_vm.network_interface[0].network_ip
}
}
output "ip_public_frontend" {
value = google_compute_instance.frontend_vm.network_interface[0].access_config[0].nat_ip
}
output "nom_instances" {
value = {
frontend = google_compute_instance.frontend_vm.name
backend = google_compute_instance.backend_vm.name
database = google_compute_instance.database_vm.name
}
}

View File

@@ -0,0 +1,32 @@
# À vous de définir les variables pour :
# - instance_type
# - zone
# - frontend_subnet_id
# - backend_subnet_id
# - database_subnet_id
variable "instance_type" {
description = "type de l'instance"
type = string
}
variable "zone" {
description = "région"
type = string
}
variable "frontend_subnet_id" {
description = "front-end id"
type = string
}
variable "backend_subnet_id" {
description = "back-end id"
type = string
}
variable "database_subnet_id" {
description = "database id"
type = string
}

View File

@@ -0,0 +1,31 @@
# Compte service terraform
resource "google_service_account" "terraform_sa" {
account_id = "terraform-sa"
display_name = "terraform compte service"
}
resource "google_service_account_key" "terraform_sa_key" {
service_account_id = google_service_account.terraform_sa.name
public_key_type = "TYPE_X509_PEM_FILE"
}
resource "google_project_iam_binding" "custom_service_account" {
project = var.project_id
role = "roles/viewer"
members = [
"serviceAccount:${google_service_account.terraform_sa.email}",
]
}
data "google_client_openid_userinfo" "me" {
}
resource "google_os_login_ssh_public_key" "cache" {
user = data.google_client_openid_userinfo.me.email
project = var.project_id
key = file("~/.ssh/id_ed25519.pub")
}

View File

@@ -0,0 +1,11 @@
output "service_account_email" {
description = "Service account email."
value = google_service_account.terraform_sa.email
}
output "service_account_key" {
description = "Service account key."
sensitive = true
value = google_service_account_key.terraform_sa_key.private_key
}

View File

@@ -0,0 +1,4 @@
variable "project_id" {
description = "ID du projet GCP dans lequel appliquer les règles IAM"
type = string
}

View File

@@ -0,0 +1,91 @@
# VPC
resource "google_compute_network" "vpc" {
name = "vpc"
auto_create_subnetworks = false
}
# Sous-réseau
# front-end
resource "google_compute_subnetwork" "frontend" {
name = "frontend-subnet"
network = google_compute_network.vpc.id
ip_cidr_range = "10.0.1.0/24"
region = "europe-west1"
}
# back-end
resource "google_compute_subnetwork" "backend" {
name = "backend-subnet"
network = google_compute_network.vpc.id
ip_cidr_range = "10.0.2.0/24"
region = "europe-west1"
}
# data-base
resource "google_compute_subnetwork" "database" {
name = "database-subnet"
network = google_compute_network.vpc.id
ip_cidr_range = "10.0.3.0/24"
region = "europe-west1"
}
# Règles de Pare-feu
# - HTTP/HTTPS vers frontend
resource "google_compute_firewall" "allow_http" {
name = "allow-http"
network = google_compute_network.vpc.id
allow {
protocol = "tcp"
ports = ["80", "443"]
}
source_ranges = ["0.0.0.0/0"]
target_tags = ["frontend"]
}
# - SSH vers toutes les instances
resource "google_compute_firewall" "allow_ssh" {
name = "allow-ssh"
network = google_compute_network.vpc.id
allow {
protocol = "tcp"
ports = ["22"]
}
source_ranges = ["0.0.0.0/0"]
target_tags = ["ssh"]
}
# - Port 8000 de frontend vers backend
resource "google_compute_firewall" "frontend_to_backend" {
name = "frontend-to-backend"
network = google_compute_network.vpc.id
allow {
protocol = "tcp"
ports = ["8000"]
}
source_tags = ["frontend"]
target_tags = ["backend"]
}
# - Port 3306 de backend vers database
resource "google_compute_firewall" "backend_to_database" {
name = "backend-to-database"
network = google_compute_network.vpc.id
allow {
protocol = "tcp"
ports = ["3306"]
}
source_tags = ["backend"]
target_tags = ["database"]
}

View File

@@ -0,0 +1,11 @@
output "vpc_terraform_output" {
value = google_compute_network.vpc.id
}
output "subnets" {
value = {
frontend = google_compute_subnetwork.frontend.id
backend = google_compute_subnetwork.backend.id
database = google_compute_subnetwork.database.id
}
}

View File

@@ -0,0 +1,30 @@
variable "project_name" {
description = "Nom du projet"
type = string
}
variable "region" {
description = "Région"
type = string
}
variable "frontend_cidr" {
description = "CIDR du frontend"
type = string
}
variable "backend_cidr" {
description = "CIDR du backend"
type = string
}
variable "database_cidr" {
description = "CIDR de la database"
type = string
}
variable "ssh_source_ranges" {
description = "Plages IP autorisées pour SSH"
type = string
}

File diff suppressed because one or more lines are too long