modules/mig-network/main.tf (56 lines of code) (raw):

/** * Copyright 2022 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /***************** *** Create VPC *** ******************/ module "mig_vpc" { source = "terraform-google-modules/network/google" version = "~> 6.0" project_id = var.project_id network_name = var.network_name routing_mode = "GLOBAL" subnets = var.subnets } /*********************** *** Create Cloud NAT *** ************************/ module "cloud-nat" { source = "terraform-google-modules/cloud-nat/google" version = "~> 1.2" create_router = true project_id = var.project_id region = var.region network = module.mig_vpc.network_name router = format("router-%s", var.network_name) name = format("nat-%s", var.network_name) } /********************************************************************************* **** Firewall rule to allow incoming ssh connections from Google IAP servers. **** **********************************************************************************/ resource "google_compute_firewall" "inbound-ip-ssh" { name = format("allow-ssh-iap-%s", var.network_name) project = var.project_id network = module.mig_vpc.network_name direction = "INGRESS" allow { protocol = "tcp" ports = ["22"] } source_ranges = [ "35.235.240.0/20" ] target_tags = ["allow-ssh-iap"] }