Compare commits

35 Commits
main ... main

Author SHA1 Message Date
f1dfce13f9 ajout du terraform show dans le git 2025-12-04 11:33:22 +01:00
08b0705275 fin output dev 2025-12-04 10:47:51 +01:00
91e6f1b6d6 fin output dev 2025-12-04 10:45:52 +01:00
b2987e04fa fin output dev 2025-12-04 10:45:23 +01:00
d7d96b1dbb fin output dev 2025-12-04 10:41:26 +01:00
542a7e1999 fin output dev 2025-12-04 10:39:18 +01:00
6f9b309a8d manque le s de subnets 2025-12-04 10:28:59 +01:00
8f13e8bc20 manque le s de subnets 2025-12-04 10:26:36 +01:00
cf56f70999 manque le s de subnets 2025-12-04 10:23:10 +01:00
597ad27a69 fin de la partie 4 2025-12-04 10:22:29 +01:00
76a2346e3d fin de la partie 4 2025-12-04 10:19:24 +01:00
171c8cf6e5 fin de la partie 4 2025-12-04 10:16:39 +01:00
3270aeb49a fin de la partie 4 2025-12-04 10:15:08 +01:00
1be3f79315 manque le projectid pour l'os login 2025-12-04 10:04:29 +01:00
5cea6adeee manque le .pub 2025-12-04 10:00:28 +01:00
72bf209a13 modification ressource 2025-12-04 09:58:27 +01:00
af45a9ae54 retour avant* 2025-12-04 09:57:02 +01:00
2af116c7b3 modification iam 2025-12-04 09:56:28 +01:00
41a473f30c modification iam 2025-12-04 09:55:43 +01:00
4ca153962a modification sur le nom de la ressource iam pour main 2025-12-04 09:50:02 +01:00
bd616e45e0 modification sur le nom de la ressource iam 2025-12-04 09:48:43 +01:00
641420c6c5 modification output iam key 2025-12-04 09:44:12 +01:00
72eb80e332 modification output iam 2025-12-04 09:41:20 +01:00
3c03a87242 module iam erreur 2025-12-04 09:37:52 +01:00
92da404b95 module iam 2025-12-04 09:32:12 +01:00
588b185ba6 remplacer _ par - dans le type d'insrtance 2025-12-04 08:40:05 +01:00
21eb9becca compute ajout des vm 2025-12-03 17:28:08 +01:00
1e15c5b09c compute modification frontend 2025-12-03 17:25:49 +01:00
b3722a10fb compute modification 2025-12-03 17:23:16 +01:00
5b3ce9600f compute fait 2025-12-03 17:19:47 +01:00
899cf21887 mauvais nom des variables 2025-12-03 16:21:10 +01:00
75323179be modification accès variable 2025-12-03 16:17:16 +01:00
10166ac021 modification de output 2025-12-03 16:12:32 +01:00
f27fcb8966 ajout de ssh sources 2025-12-03 16:11:02 +01:00
506d65662e ajout de network 2025-12-03 16:09:29 +01:00
13 changed files with 1041 additions and 0 deletions

575
terraform-show.txt Normal file

File diff suppressed because one or more lines are too long

View File

@@ -0,0 +1,42 @@
# À vous de :
# 1. Configurer le provider google
# 2. Appeler les trois modules avec les bonnes variables
# 3. Créer le fichier de configuration Ansible (template)
terraform {
required_providers {
google = {
source = "hashicorp/google"
version = "~> 6.12.0"
}
}
}
provider "google" {
project = var.project_id
region = var.region
}
module "network" {
source = "../../modules/network"
project_name = var.project_name
region = var.region
frontend_cidr = var.frontend_cidr
backend_cidr = var.backend_cidr
database_cidr = var.database_cidr
ssh_source_ranges = var.ssh_source_ranges
}
module "compute" {
source = "../../modules/compute"
instance_type = var.instance_type
zone = var.zone
frontend_subnet_id = module.network.subnets.frontend
backend_subnet_id = module.network.subnets.backend
database_subnet_id = module.network.subnets.database
}
module "iam" {
source = "../../modules/iam"
project_id = var.project_id
}

View File

@@ -0,0 +1,28 @@
output "ip_internes" {
value = module.compute.ip_internes
}
output "ip_public_frontend" {
value = module.compute.ip_public_frontend
}
output "nom_instances" {
value = module.compute.nom_instances
}
output "service_account_email" {
value = module.iam.service_account_email
}
output "service_account_key" {
sensitive = true
value = module.iam.service_account_key
}
output "vpc" {
value = module.network.vpc
}
output "subnets" {
value = module.network.subnets
}

View File

@@ -0,0 +1,55 @@
# définissez toutes les variables nécessaires avec des valeurs par défaut appropriées.
variable "project_name" {
description = "Nom du projet"
type = string
default = "My First Project"
}
variable "region" {
description = "Region du projet"
type = string
default = "europe-west9"
}
variable "frontend_cidr" {
description = "CIDR for frontend subnet"
type = string
default = "10.0.1.0/24"
}
variable "backend_cidr" {
description = "CIDR for backend subnet"
type = string
default = "10.0.2.0/24"
}
variable "database_cidr" {
description = "CIDR for database subnet"
type = string
default = "10.0.3.0/24"
}
variable "ssh_source_ranges" {
description = ""
type = string
default = "0.0.0.0/0"
}
variable "project_id" {
description = "ID du projet"
type = string
default = "glossy-handler-478713-i1"
}
variable "instance_type" {
description = "type de l'instance"
type = string
default = "e2-small"
}
variable "zone" {
description = "Nom de la zone"
type = string
default = "europe-west9-b"
}

View File

@@ -0,0 +1,92 @@
# À vous de créer :
# 1. Instance frontend :
# - Image : debian-11
# - Disque : 10GB
# - IP publique
# - Tags : frontend, ssh
# - OS Login enabled
# 2. Instance backend :
# - Image : debian-11
# - Disque : 10GB
# - Pas d'IP publique (interne seulement)
# - Tags : backend, ssh
# - OS Login enabled
# 3. Instance database :
# - Image : debian-11
# - Disque : 20GB
# - Pas d'IP publique
# - Tags : database, ssh
# - OS Login enabled
resource "google_compute_instance" "vm_frontend" {
name = "vm-frontend"
machine_type = var.instance_type
zone = var.zone
boot_disk {
initialize_params {
image = "debian-cloud/debian-11"
size = 10
}
}
network_interface {
access_config {} # IP publique
subnetwork = var.frontend_subnet_id
}
tags = ["frontend", "ssh"]
metadata = {
enable-oslogin = "TRUE"
}
}
resource "google_compute_instance" "vm_backend" {
name = "vm-backend"
machine_type = var.instance_type
zone = var.zone
boot_disk {
initialize_params {
image = "debian-cloud/debian-11"
size = 10
}
}
network_interface {
subnetwork = var.backend_subnet_id
}
tags = ["backend", "ssh"]
metadata = {
enable-oslogin = "TRUE"
}
}
resource "google_compute_instance" "vm_database" {
name = "vm-database"
machine_type = var.instance_type
zone = var.zone
boot_disk {
initialize_params {
image = "debian-cloud/debian-11"
size = 20
}
}
network_interface {
subnetwork = var.database_subnet_id
}
tags = ["database", "ssh"]
metadata = {
enable-oslogin = "TRUE"
}
}

View File

@@ -0,0 +1,24 @@
# À vous d'exposer :
# 1. Les IPs internes de toutes les instances
# 2. L'IP publique du frontend
# 3. Les noms des instances
output "ip_internes" {
value = {
frontend = google_compute_instance.vm_frontend.network_interface[0].network_ip
backend = google_compute_instance.vm_backend.network_interface[0].network_ip
database = google_compute_instance.vm_database.network_interface[0].network_ip
}
}
output "ip_public_frontend" {
value = google_compute_instance.vm_frontend.network_interface[0].access_config[0].nat_ip
}
output "nom_instances" {
value = {
frontend = google_compute_instance.vm_frontend.name
backend = google_compute_instance.vm_backend.name
database = google_compute_instance.vm_database.name
}
}

View File

@@ -0,0 +1,31 @@
# À vous de définir les variables pour :
# - instance_type
# - zone
# - frontend_subnet_id
# - backend_subnet_id
# - database_subnet_id
variable "instance_type" {
description = "type de l'instance"
type = string
}
variable "zone" {
description = "Nom de la zone"
type = string
}
variable "frontend_subnet_id" {
description = "id du frontend"
type = string
}
variable "backend_subnet_id" {
description = "id du backend"
type = string
}
variable "database_subnet_id" {
description = "id du database"
type = string
}

View File

@@ -0,0 +1,33 @@
# À vous de créer :
# 1. Un compte de service pour Terraform
# 2. Une clé pour ce compte de service
# 3. Les rôles IAM nécessaires
# 4. La configuration OS Login avec votre clé SSH
resource "google_service_account" "service_account" {
account_id = "terraform"
display_name = "terraform"
}
resource "google_service_account_key" "mykey" {
service_account_id = google_service_account.service_account.name
public_key_type = "TYPE_X509_PEM_FILE"
}
resource "google_project_iam_binding" "custom_service_account" {
project = var.project_id
role = "roles/viewer"
members = [
"serviceAccount:${google_service_account.service_account.email}",
]
}
data "google_client_openid_userinfo" "me" {
}
resource "google_os_login_ssh_public_key" "cache" {
user = data.google_client_openid_userinfo.me.email
project = var.project_id
key = file("~/.ssh/id_ed25519.pub")
}

View File

@@ -0,0 +1,14 @@
# À vous d'exposer :
# 1. L'email du compte de service
# 2. La clé du compte de service (sensitive = true)
output "service_account_email" {
description = "Service account email."
value = google_service_account.service_account.email
}
output "service_account_key" {
description = "Service account key."
sensitive = true
value = google_service_account_key.mykey.private_key
}

View File

@@ -0,0 +1,7 @@
# À vous de définir :
# - project_id (string)
variable "project_id" {
description = "ID du projet"
type = string
}

View File

@@ -0,0 +1,88 @@
# À vous de créer :
# 1. Un VPC personnalisé avec auto_create_subnetworks = false
# 2. Trois sous-réseaux (frontend, backend, database)
# 3. Règles de firewall :
# - HTTP/HTTPS vers frontend
# - SSH vers toutes les instances
# - Port 8000 de frontend vers backend
# - Port 3306 de backend vers database
# VPC
resource "google_compute_network" "vpc_terraform" {
name = "vpc-terraform"
auto_create_subnetworks = false
}
# Sous-réseau
resource "google_compute_subnetwork" "subnet_frontend" {
name = "frontend"
network = google_compute_network.vpc_terraform.id
ip_cidr_range = var.frontend_cidr
region = var.region
}
resource "google_compute_subnetwork" "subnet_backend" {
name = "backend"
network = google_compute_network.vpc_terraform.id
ip_cidr_range = var.backend_cidr
region = var.region
}
resource "google_compute_subnetwork" "subnet_database" {
name = "database"
network = google_compute_network.vpc_terraform.id
ip_cidr_range = var.database_cidr
region = var.region
}
resource "google_compute_firewall" "allow_user_frontend" {
name = "allow-user-frontend"
network = google_compute_network.vpc_terraform.id
allow {
protocol = "tcp"
ports = ["80", "443"]
}
source_ranges = ["0.0.0.0/0"]
target_tags = ["frontend"]
}
resource "google_compute_firewall" "allow_frontend_backend" {
name = "allow-frontend-backend"
network = google_compute_network.vpc_terraform.id
allow {
protocol = "tcp"
ports = ["8000"]
}
source_tags = ["frontend"]
target_tags = ["backend"]
}
resource "google_compute_firewall" "allow_ssh_all" {
name = "allow-ssh-all"
network = google_compute_network.vpc_terraform.id
allow {
protocol = "tcp"
ports = ["22"]
}
source_ranges = ["0.0.0.0/0"]
target_tags = ["ssh"]
}
resource "google_compute_firewall" "allow_backend_database" {
name = "allow-backend-database"
network = google_compute_network.vpc_terraform.id
allow {
protocol = "tcp"
ports = ["3306"]
}
source_tags = ["backend"]
target_tags = ["database"]
}

View File

@@ -0,0 +1,15 @@
# À vous d'exposer :
# 1. L'ID du VPC
# 2. Les IDs des sous-réseaux sous forme de map
output "vpc" {
value = google_compute_network.vpc_terraform.id
}
output "subnets" {
value = {
frontend = google_compute_subnetwork.subnet_frontend.id
backend = google_compute_subnetwork.subnet_backend.id
database = google_compute_subnetwork.subnet_database.id
}
}

View File

@@ -0,0 +1,37 @@
# À vous de définir les variables pour :
# - project_name (string)
# - region (string)
# - frontend_cidr (string)
# - backend_cidr (string)
# - database_cidr (string)
# - ssh_source_ranges (string)
variable "project_name" {
description = "Nom du projet"
type = string
}
variable "region" {
description = "Region du projet"
type = string
}
variable "frontend_cidr" {
description = "CIDR for frontend subnet"
type = string
}
variable "backend_cidr" {
description = "CIDR for backend subnet"
type = string
}
variable "database_cidr" {
description = "CIDR for database subnet"
type = string
}
variable "ssh_source_ranges" {
description = ""
type = string
}