modules/iap-tunnel/main.tf (33 lines of code) (raw):

/** * Copyright 2023 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #Creating IAP Firewall rule and allowing IAP CIDR block resource "google_compute_firewall" "iap_firewall" { project = var.project_id name = var.name network = var.network source_ranges = ["35.235.240.0/20"] allow { protocol = "tcp" ports = ["80", "22", ] } } # This will be used to control which users and groups are allowed to use IAP Tunnel and which VM instances they're allowed to connect to. resource "google_iap_tunnel_instance_iam_binding" "policy" { provider = google-beta project = var.project_id instance = var.instance_name zone = var.zone role = "roles/iap.tunnelResourceAccessor" members = var.members }