Compare commits

15 Commits
main ... main

Author SHA1 Message Date
4409b90b69 terraform show 2025-12-04 11:58:07 +01:00
4b085c99e7 dd 2025-12-03 17:34:05 +01:00
a43cca0c2e here 2025-12-03 17:24:18 +01:00
a8d616050b dddddddddddddddddddddddddddddddddddddddddddddddddddddddd 2025-12-03 17:14:10 +01:00
4e06ba8a7e HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA 2025-12-03 17:13:22 +01:00
17c44c7c3b dd 2025-12-03 17:07:46 +01:00
fd08d2b0d5 gg well played 2025-12-03 17:05:31 +01:00
9cc824d41c maj 2025-12-03 17:02:13 +01:00
80ddec8234 d 2025-12-03 16:54:04 +01:00
80d0b6148e maj 2025-12-03 16:47:52 +01:00
93f91bbdf5 maj 2025-12-03 16:41:53 +01:00
068cdcb766 dev/output 2025-12-03 16:24:35 +01:00
df23a17a7a d 2025-12-03 16:21:37 +01:00
91d297cb21 merci gpt XD 2025-12-03 16:15:42 +01:00
f2eef8ed81 initial 2025-12-03 15:51:27 +01:00
13 changed files with 966 additions and 0 deletions

577
terraform-show.txt Normal file

File diff suppressed because one or more lines are too long

View File

@@ -0,0 +1,60 @@
terraform {
required_providers {
google = {
source = "hashicorp/google"
version = "~> 6.12.0"
}
}
}
provider "google" {
project = var.project_id
region = var.region
}
# ------------------------
# Module NETWORK
# ------------------------
module "network" {
source = "../../modules/network"
project_name = var.project_name
region = var.region
frontend_cidr = var.frontend_cidr
backend_cidr = var.backend_cidr
database_cidr = var.database_cidr
ssh_source_ranges = var.ssh_source_ranges
}
# ------------------------
# Module COMPUTE
# ------------------------
module "compute" {
source = "../../modules/compute"
instance_type = var.instance_type
zone = var.zone
frontend_subnet_id = module.network.subnet_ids["frontend"]
backend_subnet_id = module.network.subnet_ids["backend"]
database_subnet_id = module.network.subnet_ids["database"]
}
# ------------------------
# Module IAM
# ------------------------
module "iam" {
source = "../../modules/iam"
project_id = var.project_id
}
# ------------------------
# Fichier template Ansible
# ------------------------
resource "local_file" "ansible_cfg" {
filename = "${path.module}/ansible.cfg"
content = templatefile("${path.module}/../../templates/ansible.cfg.tpl", {
remote_user = "raphael.hochlaf@gmail.com"
})
}

View File

@@ -0,0 +1,11 @@
output "network_info" {
value = module.network
}
output "instance_info" {
value = module.compute
}
output "iam_info" {
value = module.iam.service_account_email
}

View File

@@ -0,0 +1,34 @@
variable "project_name" {
default = "test"
}
variable "project_id" {
default = "empanada-478713"
}
variable "region" {
default = "europe-west9"
}
variable "zone" {
default = "${var.region}-b"
}
variable "instance_type" {
default = "e2-medium"
}
variable "frontend_cidr" {
default = "10.0.1.0/24"
}
variable "backend_cidr" {
default = "10.0.2.0/24"
}
variable "database_cidr" {
default = "10.0.3.0/24"
}
variable "ssh_source_ranges" {
default = "0.0.0.0/0"
}

View File

@@ -0,0 +1,85 @@
locals {
image = "projects/debian-cloud/global/images/family/debian-11"
}
# ------------------------
# FRONTEND instance
# ------------------------
resource "google_compute_instance" "frontend" {
name = "frontend"
machine_type = var.instance_type
zone = var.zone
tags = ["frontend", "ssh"]
boot_disk {
initialize_params {
size = 10
image = local.image
}
}
network_interface {
subnetwork = var.frontend_subnet_id
access_config {}
}
metadata = {
enable-oslogin = "TRUE"
}
}
# ------------------------
# BACKEND instance
# ------------------------
resource "google_compute_instance" "backend" {
name = "backend"
machine_type = var.instance_type
zone = var.zone
tags = ["backend", "ssh"]
boot_disk {
initialize_params {
size = 10
image = local.image
}
}
network_interface {
subnetwork = var.backend_subnet_id
}
metadata = {
enable-oslogin = "TRUE"
}
}
# ------------------------
# DATABASE instance
# ------------------------
resource "google_compute_instance" "database" {
name = "database"
machine_type = var.instance_type
zone = var.zone
tags = ["database", "ssh"]
boot_disk {
initialize_params {
size = 20
image = local.image
}
}
network_interface {
subnetwork = var.database_subnet_id
}
metadata = {
enable-oslogin = "TRUE"
}
}

View File

@@ -0,0 +1,19 @@
output "internal_ips" {
value = {
frontend = google_compute_instance.frontend.network_interface[0].network_ip
backend = google_compute_instance.backend.network_interface[0].network_ip
database = google_compute_instance.database.network_interface[0].network_ip
}
}
output "frontend_public_ip" {
value = google_compute_instance.frontend.network_interface[0].access_config[0].nat_ip
}
output "instance_names" {
value = [
google_compute_instance.frontend.name,
google_compute_instance.backend.name,
google_compute_instance.database.name
]
}

View File

@@ -0,0 +1,24 @@
variable "instance_type" {
description = "instance_type"
type = string
}
variable "zone" {
description = "zone"
type = string
}
variable "frontend_subnet_id" {
description = "frontend_subnet_id"
type = string
}
variable "backend_subnet_id" {
description = "backend_subnet_id"
type = string
}
variable "database_subnet_id" {
description = "database_subnet_id"
type = string
}

View File

@@ -0,0 +1,24 @@
# Service Account Terraform
resource "google_service_account" "terraform_sa" {
account_id = "terraform-admin"
display_name = "Terraform Admin"
}
# Key
resource "google_service_account_key" "terraform_sa_key" {
service_account_id = google_service_account.terraform_sa.name
}
# IAM roles nécessaires
resource "google_project_iam_member" "terraform_roles" {
project = var.project_id
role = "roles/owner"
member = "serviceAccount:${google_service_account.terraform_sa.email}"
}
# Activation OS Login pour SSH
resource "google_os_login_ssh_public_key" "ssh_key" {
user = "raphael.hochlaf@gmail.com"
key = file("~/.ssh/id_ed25519.pub")
project = var.project_id
}

View File

@@ -0,0 +1,8 @@
output "service_account_email" {
value = google_service_account.terraform_sa.email
}
output "service_account_private_key" {
value = google_service_account_key.terraform_sa_key.private_key
sensitive = true
}

View File

@@ -0,0 +1,4 @@
variable "project_id" {
description = "project_id"
type = string
}

View File

@@ -0,0 +1,79 @@
resource "google_compute_network" "vpc" {
name = "${var.project_name}-vpc"
auto_create_subnetworks = false
}
resource "google_compute_subnetwork" "frontend" {
name = "${var.project_name}-frontend"
region = var.region
network = google_compute_network.vpc.self_link
ip_cidr_range = var.frontend_cidr
}
resource "google_compute_subnetwork" "backend" {
name = "${var.project_name}-backend"
region = var.region
network = google_compute_network.vpc.self_link
ip_cidr_range = var.backend_cidr
}
resource "google_compute_subnetwork" "database" {
name = "${var.project_name}-database"
region = var.region
network = google_compute_network.vpc.self_link
ip_cidr_range = var.database_cidr
}
# Firewall rules ------------------
resource "google_compute_firewall" "frontend_http" {
name = "${var.project_name}-frontend-http"
network = google_compute_network.vpc.self_link
allow {
protocol = "tcp"
ports = ["80", "443"]
}
target_tags = ["frontend"]
source_ranges = ["0.0.0.0/0"]
}
resource "google_compute_firewall" "ssh" {
name = "${var.project_name}-ssh"
network = google_compute_network.vpc.self_link
allow {
protocol = "tcp"
ports = ["22"]
}
target_tags = ["ssh"]
source_ranges = [var.ssh_source_ranges]
}
resource "google_compute_firewall" "frontend_backend" {
name = "${var.project_name}-frontend-to-backend"
network = google_compute_network.vpc.self_link
allow {
protocol = "tcp"
ports = ["8000"]
}
source_tags = ["frontend"]
target_tags = ["backend"]
}
resource "google_compute_firewall" "backend_database" {
name = "${var.project_name}-backend-to-database"
network = google_compute_network.vpc.self_link
allow {
protocol = "tcp"
ports = ["3306"]
}
source_tags = ["backend"]
target_tags = ["database"]
}

View File

@@ -0,0 +1,11 @@
output "vpc_id" {
value = google_compute_network.vpc.id
}
output "subnet_ids" {
value = {
frontend = google_compute_subnetwork.frontend.id
backend = google_compute_subnetwork.backend.id
database = google_compute_subnetwork.database.id
}
}

View File

@@ -0,0 +1,30 @@
variable "project_name" {
description = "Nom du projet"
type = string
}
variable "region" {
description = "Nom de la région"
type = string
}
variable "frontend_cidr" {
description = "CIDR for frontend subnet"
type = string
}
variable "backend_cidr" {
description = "CIDR for backend subnet"
type = string
}
variable "database_cidr" {
description = "CIDR for database subnet"
type = string
}
variable "ssh_source_ranges" {
description = "ssh_source_ranges"
type = string
}