Skip to content

Commit 706b1cb

Browse files
Bump RegionSecurityPolicy and RegionSecurityPolicyRule resources to GA (#13592) (#969)
[upstream:045a8b725e49e6d37302afa11a2c11a62d9ae978] Signed-off-by: Modular Magician <[email protected]>
1 parent 0943e45 commit 706b1cb

File tree

17 files changed

+414
-16
lines changed

17 files changed

+414
-16
lines changed

region_security_policy_basic/main.tf

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
11
resource "google_compute_region_security_policy" "region-sec-policy-basic" {
2-
provider = google-beta
3-
42
name = "my-sec-policy-basic-${local.name_suffix}"
53
description = "basic region security policy"
64
type = "CLOUD_ARMOR"

region_security_policy_rule_basic/main.tf

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,11 @@
11
resource "google_compute_region_security_policy" "default" {
2-
provider = google-beta
3-
42
region = "us-west2"
53
name = "policyruletest-${local.name_suffix}"
64
description = "basic region security policy"
75
type = "CLOUD_ARMOR"
86
}
97

108
resource "google_compute_region_security_policy_rule" "policy_rule" {
11-
provider = google-beta
12-
139
region = "us-west2"
1410
security_policy = google_compute_region_security_policy.default.name
1511
description = "new rule"
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
# This file has some scaffolding to make sure that names are unique and that
2+
# a region and zone are selected when you try to create your Terraform resources.
3+
4+
locals {
5+
name_suffix = "${random_pet.suffix.id}"
6+
}
7+
8+
resource "random_pet" "suffix" {
9+
length = 2
10+
}
11+
12+
provider "google" {
13+
region = "us-central1"
14+
zone = "us-central1-c"
15+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
resource "google_compute_region_security_policy" "default" {
2+
region = "us-west2"
3+
name = "policywithdefaultrule-${local.name_suffix}"
4+
description = "basic region security policy"
5+
type = "CLOUD_ARMOR"
6+
}
7+
8+
resource "google_compute_region_security_policy_rule" "default_rule" {
9+
region = "us-west2"
10+
security_policy = google_compute_region_security_policy.default.name
11+
description = "new rule"
12+
action = "deny"
13+
priority = "2147483647"
14+
match {
15+
versioned_expr = "SRC_IPS_V1"
16+
config {
17+
src_ip_ranges = ["*"]
18+
}
19+
}
20+
}
21+
22+
resource "google_compute_region_security_policy_rule" "policy_rule" {
23+
region = "us-west2"
24+
security_policy = google_compute_region_security_policy.default.name
25+
description = "new rule"
26+
priority = 100
27+
match {
28+
versioned_expr = "SRC_IPS_V1"
29+
config {
30+
src_ip_ranges = ["10.10.0.0/16"]
31+
}
32+
}
33+
action = "allow"
34+
preview = true
35+
}
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
===
2+
3+
These examples use real resources that will be billed to the
4+
Google Cloud Platform project you use - so make sure that you
5+
run "terraform destroy" before quitting!
6+
7+
===
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
# Region Security Policy Rule Default Rule - Terraform
2+
3+
## Setup
4+
5+
<walkthrough-author name="[email protected]" analyticsId="UA-125550242-1" tutorialName="region_security_policy_rule_default_rule" repositoryUrl="https://github.com/terraform-google-modules/docs-examples"></walkthrough-author>
6+
7+
Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform.
8+
9+
<walkthrough-project-billing-setup></walkthrough-project-billing-setup>
10+
11+
Terraform provisions real GCP resources, so anything you create in this session will be billed against this project.
12+
13+
## Terraforming!
14+
15+
Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command
16+
to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up
17+
the project name from the environment variable.
18+
19+
```bash
20+
export GOOGLE_CLOUD_PROJECT={{project-id}}
21+
```
22+
23+
After that, let's get Terraform started. Run the following to pull in the providers.
24+
25+
```bash
26+
terraform init
27+
```
28+
29+
With the providers downloaded and a project set, you're ready to use Terraform. Go ahead!
30+
31+
```bash
32+
terraform apply
33+
```
34+
35+
Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan.
36+
37+
```bash
38+
yes
39+
```
40+
41+
42+
## Post-Apply
43+
44+
### Editing your config
45+
46+
Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed.
47+
48+
```bash
49+
terraform plan
50+
```
51+
52+
So let's make a change! Try editing a number, or appending a value to the name in the editor. Then,
53+
run a 'plan' again.
54+
55+
```bash
56+
terraform plan
57+
```
58+
59+
Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes
60+
at the 'yes' prompt.
61+
62+
```bash
63+
terraform apply
64+
```
65+
66+
```bash
67+
yes
68+
```
69+
70+
## Cleanup
71+
72+
Run the following to remove the resources Terraform provisioned:
73+
74+
```bash
75+
terraform destroy
76+
```
77+
```bash
78+
yes
79+
```

region_security_policy_rule_multiple_rules/main.tf

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,11 @@
11
resource "google_compute_region_security_policy" "default" {
2-
provider = google-beta
3-
42
region = "us-west2"
53
name = "policywithmultiplerules-${local.name_suffix}"
64
description = "basic region security policy"
75
type = "CLOUD_ARMOR"
86
}
97

108
resource "google_compute_region_security_policy_rule" "policy_rule_one" {
11-
provider = google-beta
12-
139
region = "us-west2"
1410
security_policy = google_compute_region_security_policy.default.name
1511
description = "new rule one"
@@ -25,8 +21,6 @@ resource "google_compute_region_security_policy_rule" "policy_rule_one" {
2521
}
2622

2723
resource "google_compute_region_security_policy_rule" "policy_rule_two" {
28-
provider = google-beta
29-
3024
region = "us-west2"
3125
security_policy = google_compute_region_security_policy.default.name
3226
description = "new rule two"
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
# This file has some scaffolding to make sure that names are unique and that
2+
# a region and zone are selected when you try to create your Terraform resources.
3+
4+
locals {
5+
name_suffix = "${random_pet.suffix.id}"
6+
}
7+
8+
resource "random_pet" "suffix" {
9+
length = 2
10+
}
11+
12+
provider "google" {
13+
region = "us-central1"
14+
zone = "us-central1-c"
15+
}
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
resource "google_compute_region_security_policy" "default" {
2+
region = "asia-southeast1"
3+
name = "policyruletest-${local.name_suffix}"
4+
description = "basic region security policy"
5+
type = "CLOUD_ARMOR"
6+
}
7+
8+
resource "google_compute_region_security_policy_rule" "policy_rule" {
9+
region = "asia-southeast1"
10+
security_policy = google_compute_region_security_policy.default.name
11+
description = "new rule"
12+
priority = 100
13+
match {
14+
versioned_expr = "SRC_IPS_V1"
15+
config {
16+
src_ip_ranges = ["10.10.0.0/16"]
17+
}
18+
}
19+
preconfigured_waf_config {
20+
exclusion {
21+
request_uri {
22+
operator = "STARTS_WITH"
23+
value = "/admin"
24+
}
25+
target_rule_set = "rce-stable"
26+
}
27+
exclusion {
28+
request_query_param {
29+
operator = "CONTAINS"
30+
value = "password"
31+
}
32+
request_query_param {
33+
operator = "STARTS_WITH"
34+
value = "freeform"
35+
}
36+
request_query_param {
37+
operator = "EQUALS"
38+
value = "description"
39+
}
40+
target_rule_set = "xss-stable"
41+
target_rule_ids = [
42+
"owasp-crs-v030001-id941330-xss",
43+
"owasp-crs-v030001-id941340-xss",
44+
]
45+
}
46+
}
47+
action = "allow"
48+
preview = true
49+
}
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
===
2+
3+
These examples use real resources that will be billed to the
4+
Google Cloud Platform project you use - so make sure that you
5+
run "terraform destroy" before quitting!
6+
7+
===

0 commit comments

Comments
 (0)