test network
This commit is contained in:
parent
f29e42c46d
commit
5f4193870f
28
terraform/environments/dev/main.tf
Normal file
28
terraform/environments/dev/main.tf
Normal file
@ -0,0 +1,28 @@
|
||||
terraform {
|
||||
required_providers {
|
||||
google = {
|
||||
source = "hashicorp/google"
|
||||
version = "~> 6.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
provider "google" {
|
||||
project = var.project_id
|
||||
region = var.region
|
||||
}
|
||||
|
||||
module "network" {
|
||||
source = "../../modules/network"
|
||||
|
||||
# Variables d'entrée
|
||||
project_name = var.project_name
|
||||
region = var.region
|
||||
|
||||
# Autres variables spécifiques au module
|
||||
cidr_range = var.cidr_range
|
||||
frontend_cidr = var.frontend_cidr
|
||||
backend_cidr = var.backend_cidr
|
||||
database_cidr = var.database_cidr
|
||||
ssh_source_ranges = var.ssh_source_ranges
|
||||
}
|
0
terraform/environments/dev/outputs.tf
Normal file
0
terraform/environments/dev/outputs.tf
Normal file
47
terraform/environments/dev/variables.tf
Normal file
47
terraform/environments/dev/variables.tf
Normal file
@ -0,0 +1,47 @@
|
||||
# - project_name (string)
|
||||
variable "project_name" {
|
||||
description = "nom du projet"
|
||||
type = string
|
||||
default = "TP_IUT"
|
||||
}
|
||||
|
||||
# - region (string)
|
||||
variable "region" {
|
||||
description = "region du projet"
|
||||
type = string
|
||||
default = "europe-west1-d"
|
||||
}
|
||||
|
||||
# - frontend_cidr (string)
|
||||
variable "frontend_cidr" {
|
||||
description = "cidr du frontend"
|
||||
type = string
|
||||
default = "10.0.1.0/24"
|
||||
}
|
||||
|
||||
# - backend_cidr (string)
|
||||
variable "backend_cidr" {
|
||||
description = "cidr du backend"
|
||||
type = string
|
||||
default = "10.0.2.0/24"
|
||||
}
|
||||
|
||||
# - database_cidr (string)
|
||||
variable "database_cidr" {
|
||||
description = "cidr de la database"
|
||||
type = string
|
||||
default = "10.0.3.0/24"
|
||||
}
|
||||
|
||||
# - ssh_source_ranges (string)
|
||||
variable "ssh_source_ranges" {
|
||||
description = "acces internet"
|
||||
type = string
|
||||
default = "0.0.0.0/0"
|
||||
}
|
||||
|
||||
variable "cidr_range" {
|
||||
description = "cidr de network"
|
||||
type = string
|
||||
default = "10.0.0.0/16"
|
||||
}
|
0
terraform/modules/compute/main.tf
Normal file
0
terraform/modules/compute/main.tf
Normal file
0
terraform/modules/compute/outputs.tf
Normal file
0
terraform/modules/compute/outputs.tf
Normal file
0
terraform/modules/compute/variables.tf
Normal file
0
terraform/modules/compute/variables.tf
Normal file
0
terraform/modules/iam/main.tf
Normal file
0
terraform/modules/iam/main.tf
Normal file
0
terraform/modules/iam/outputs.tf
Normal file
0
terraform/modules/iam/outputs.tf
Normal file
0
terraform/modules/iam/variables.tf
Normal file
0
terraform/modules/iam/variables.tf
Normal file
77
terraform/modules/network/main.tf
Normal file
77
terraform/modules/network/main.tf
Normal file
@ -0,0 +1,77 @@
|
||||
resource "google_compute_network" "vpc" {
|
||||
name = "vpcsim"
|
||||
auto_create_subnetworks = false
|
||||
}
|
||||
|
||||
resource "google_compute_subnetwork" "subnet" {
|
||||
name = "frontend"
|
||||
network = google_compute_network.vpc.id
|
||||
ip_cidr_range = var.frontend_cidr
|
||||
region = var.region
|
||||
}
|
||||
|
||||
resource "google_compute_subnetwork" "subnet" {
|
||||
name = "backend"
|
||||
network = google_compute_network.vpc.id
|
||||
ip_cidr_range = var.backend_cidr
|
||||
region = var.region
|
||||
}
|
||||
|
||||
resource "google_compute_subnetwork" "subnet" {
|
||||
name = "database"
|
||||
network = google_compute_network.vpc.id
|
||||
ip_cidr_range = var.database_cidr
|
||||
region = var.region
|
||||
}
|
||||
|
||||
resource "google_compute_firewall" "allow_http-https" {
|
||||
name = "allow_http-https"
|
||||
network = google_compute_network.vpc.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
ports = ["80", "443"]
|
||||
}
|
||||
|
||||
source_ranges = ["0.0.0.0/0"]
|
||||
target_tags = ["web"]
|
||||
}
|
||||
|
||||
resource "google_compute_firewall" "allow_ssh" {
|
||||
name = "allow-ssh"
|
||||
network = google_compute_network.vpc.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
ports = ["22"]
|
||||
}
|
||||
|
||||
source_ranges = var.ssh_source_ranges
|
||||
target_tags = ["ssh"]
|
||||
}
|
||||
|
||||
resource "google_compute_firewall" "front-to-back" {
|
||||
name = "front-to-back"
|
||||
network = google_compute_network.vpc.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
ports = ["8000"]
|
||||
}
|
||||
|
||||
source_ranges = var.frontend_cidr
|
||||
target_tags = ["backend"]
|
||||
}
|
||||
|
||||
resource "google_compute_firewall" "back-to-db" {
|
||||
name = "back-to-db"
|
||||
network = google_compute_network.vpc.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
ports = ["3306"]
|
||||
}
|
||||
|
||||
source_ranges = var.backend_cidr
|
||||
target_tags = ["database"]
|
||||
}
|
0
terraform/modules/network/outputs.tf
Normal file
0
terraform/modules/network/outputs.tf
Normal file
0
terraform/modules/network/variables.tf
Normal file
0
terraform/modules/network/variables.tf
Normal file
Loading…
Reference in New Issue
Block a user