File tree Expand file tree Collapse file tree 9 files changed +258
-7
lines changed
backend_service_tls_settings
network_security_backend_authentication_config_basic
network_security_backend_authentication_config_full Expand file tree Collapse file tree 9 files changed +258
-7
lines changed Original file line number Diff line number Diff line change @@ -5,15 +5,13 @@ resource "google_compute_backend_service" "default" {
5
5
protocol = " HTTPS"
6
6
tls_settings {
7
7
sni = " example.com"
8
- subjectAltNames = [
9
- {
8
+ subject_alt_names {
10
9
dns_name = " example.com"
11
- },
12
- {
10
+ }
11
+ subject_alt_names {
13
12
uniform_resource_identifier = " https://example.com"
14
- }
15
- ]
16
- authentication_config = [google_network_security_backend_authentication_config . default . id ]
13
+ }
14
+ authentication_config = " //networksecurity.googleapis.com/${ google_network_security_backend_authentication_config . default . id } "
17
15
}
18
16
}
19
17
Original file line number Diff line number Diff line change
1
+ # This file has some scaffolding to make sure that names are unique and that
2
+ # a region and zone are selected when you try to create your Terraform resources.
3
+
4
+ locals {
5
+ name_suffix = " ${ random_pet . suffix . id } "
6
+ }
7
+
8
+ resource "random_pet" "suffix" {
9
+ length = 2
10
+ }
11
+
12
+ provider "google" {
13
+ region = " us-central1"
14
+ zone = " us-central1-c"
15
+ }
Original file line number Diff line number Diff line change
1
+ resource "google_network_security_backend_authentication_config" "default" {
2
+ name = " my-backend-authentication-config-${ local . name_suffix } "
3
+ labels = {
4
+ foo = " bar"
5
+ }
6
+ description = " my description"
7
+ well_known_roots = " PUBLIC_ROOTS"
8
+ }
Original file line number Diff line number Diff line change
1
+ ===
2
+
3
+ These examples use real resources that will be billed to the
4
+ Google Cloud Platform project you use - so make sure that you
5
+ run "terraform destroy" before quitting!
6
+
7
+ ===
Original file line number Diff line number Diff line change
1
+ # Network Security Backend Authentication Config Basic - Terraform
2
+
3
+ ## Setup
4
+
5
+ <
walkthrough-author name =
" [email protected] " analyticsId =
" UA-125550242-1 " tutorialName =
" network_security_backend_authentication_config_basic " repositoryUrl =
" https://github.com/terraform-google-modules/docs-examples " ></
walkthrough-author >
6
+
7
+ Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform.
8
+
9
+ <walkthrough-project-billing-setup ></walkthrough-project-billing-setup >
10
+
11
+ Terraform provisions real GCP resources, so anything you create in this session will be billed against this project.
12
+
13
+ ## Terraforming!
14
+
15
+ Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command
16
+ to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up
17
+ the project name from the environment variable.
18
+
19
+ ``` bash
20
+ export GOOGLE_CLOUD_PROJECT={{project-id}}
21
+ ```
22
+
23
+ After that, let's get Terraform started. Run the following to pull in the providers.
24
+
25
+ ``` bash
26
+ terraform init
27
+ ```
28
+
29
+ With the providers downloaded and a project set, you're ready to use Terraform. Go ahead!
30
+
31
+ ``` bash
32
+ terraform apply
33
+ ```
34
+
35
+ Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan.
36
+
37
+ ``` bash
38
+ yes
39
+ ```
40
+
41
+
42
+ ## Post-Apply
43
+
44
+ ### Editing your config
45
+
46
+ Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed.
47
+
48
+ ``` bash
49
+ terraform plan
50
+ ```
51
+
52
+ So let's make a change! Try editing a number, or appending a value to the name in the editor. Then,
53
+ run a 'plan' again.
54
+
55
+ ``` bash
56
+ terraform plan
57
+ ```
58
+
59
+ Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes
60
+ at the 'yes' prompt.
61
+
62
+ ``` bash
63
+ terraform apply
64
+ ```
65
+
66
+ ``` bash
67
+ yes
68
+ ```
69
+
70
+ ## Cleanup
71
+
72
+ Run the following to remove the resources Terraform provisioned:
73
+
74
+ ``` bash
75
+ terraform destroy
76
+ ```
77
+ ``` bash
78
+ yes
79
+ ```
Original file line number Diff line number Diff line change
1
+ # This file has some scaffolding to make sure that names are unique and that
2
+ # a region and zone are selected when you try to create your Terraform resources.
3
+
4
+ locals {
5
+ name_suffix = " ${ random_pet . suffix . id } "
6
+ }
7
+
8
+ resource "random_pet" "suffix" {
9
+ length = 2
10
+ }
11
+
12
+ provider "google" {
13
+ region = " us-central1"
14
+ zone = " us-central1-c"
15
+ }
Original file line number Diff line number Diff line change
1
+ resource "google_certificate_manager_certificate" "certificate" {
2
+ name = " my-certificate-${ local . name_suffix } "
3
+ labels = {
4
+ foo = " bar"
5
+ }
6
+ location = " global"
7
+ self_managed {
8
+ pem_certificate = file (" test-fixtures/cert.pem" )
9
+ pem_private_key = file (" test-fixtures/key.pem" )
10
+ }
11
+ scope = " CLIENT_AUTH"
12
+ }
13
+
14
+ resource "google_certificate_manager_trust_config" "trust_config" {
15
+ name = " my-trust-config-${ local . name_suffix } "
16
+ description = " sample description for the trust config"
17
+ location = " global"
18
+
19
+ trust_stores {
20
+ trust_anchors {
21
+ pem_certificate = file (" test-fixtures/cert.pem" )
22
+ }
23
+ intermediate_cas {
24
+ pem_certificate = file (" test-fixtures/cert.pem" )
25
+ }
26
+ }
27
+
28
+ labels = {
29
+ foo = " bar"
30
+ }
31
+ }
32
+
33
+ resource "google_network_security_backend_authentication_config" "default" {
34
+ name = " my-backend-authentication-config-${ local . name_suffix } "
35
+ labels = {
36
+ bar = " foo"
37
+ }
38
+ location = " global"
39
+ description = " my description"
40
+ well_known_roots = " PUBLIC_ROOTS"
41
+ client_certificate = google_certificate_manager_certificate. certificate . id
42
+ trust_config = google_certificate_manager_trust_config. trust_config . id
43
+ }
Original file line number Diff line number Diff line change
1
+ ===
2
+
3
+ These examples use real resources that will be billed to the
4
+ Google Cloud Platform project you use - so make sure that you
5
+ run "terraform destroy" before quitting!
6
+
7
+ ===
Original file line number Diff line number Diff line change
1
+ # Network Security Backend Authentication Config Full - Terraform
2
+
3
+ ## Setup
4
+
5
+ <
walkthrough-author name =
" [email protected] " analyticsId =
" UA-125550242-1 " tutorialName =
" network_security_backend_authentication_config_full " repositoryUrl =
" https://github.com/terraform-google-modules/docs-examples " ></
walkthrough-author >
6
+
7
+ Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform.
8
+
9
+ <walkthrough-project-billing-setup ></walkthrough-project-billing-setup >
10
+
11
+ Terraform provisions real GCP resources, so anything you create in this session will be billed against this project.
12
+
13
+ ## Terraforming!
14
+
15
+ Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command
16
+ to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up
17
+ the project name from the environment variable.
18
+
19
+ ``` bash
20
+ export GOOGLE_CLOUD_PROJECT={{project-id}}
21
+ ```
22
+
23
+ After that, let's get Terraform started. Run the following to pull in the providers.
24
+
25
+ ``` bash
26
+ terraform init
27
+ ```
28
+
29
+ With the providers downloaded and a project set, you're ready to use Terraform. Go ahead!
30
+
31
+ ``` bash
32
+ terraform apply
33
+ ```
34
+
35
+ Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan.
36
+
37
+ ``` bash
38
+ yes
39
+ ```
40
+
41
+
42
+ ## Post-Apply
43
+
44
+ ### Editing your config
45
+
46
+ Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed.
47
+
48
+ ``` bash
49
+ terraform plan
50
+ ```
51
+
52
+ So let's make a change! Try editing a number, or appending a value to the name in the editor. Then,
53
+ run a 'plan' again.
54
+
55
+ ``` bash
56
+ terraform plan
57
+ ```
58
+
59
+ Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes
60
+ at the 'yes' prompt.
61
+
62
+ ``` bash
63
+ terraform apply
64
+ ```
65
+
66
+ ``` bash
67
+ yes
68
+ ```
69
+
70
+ ## Cleanup
71
+
72
+ Run the following to remove the resources Terraform provisioned:
73
+
74
+ ``` bash
75
+ terraform destroy
76
+ ```
77
+ ``` bash
78
+ yes
79
+ ```
You can’t perform that action at this time.
0 commit comments