File tree Expand file tree Collapse file tree 9 files changed +258
-7
lines changed
backend_service_tls_settings
network_security_backend_authentication_config_basic
network_security_backend_authentication_config_full Expand file tree Collapse file tree 9 files changed +258
-7
lines changed Original file line number Diff line number Diff line change @@ -5,15 +5,13 @@ resource "google_compute_backend_service" "default" {
55 protocol = " HTTPS"
66 tls_settings {
77 sni = " example.com"
8- subjectAltNames = [
9- {
8+ subject_alt_names {
109 dns_name = " example.com"
11- },
12- {
10+ }
11+ subject_alt_names {
1312 uniform_resource_identifier = " https://example.com"
14- }
15- ]
16- authentication_config = [google_network_security_backend_authentication_config . default . id ]
13+ }
14+ authentication_config = " //networksecurity.googleapis.com/${ google_network_security_backend_authentication_config . default . id } "
1715 }
1816}
1917
Original file line number Diff line number Diff line change 1+ # This file has some scaffolding to make sure that names are unique and that
2+ # a region and zone are selected when you try to create your Terraform resources.
3+
4+ locals {
5+ name_suffix = " ${ random_pet . suffix . id } "
6+ }
7+
8+ resource "random_pet" "suffix" {
9+ length = 2
10+ }
11+
12+ provider "google" {
13+ region = " us-central1"
14+ zone = " us-central1-c"
15+ }
Original file line number Diff line number Diff line change 1+ resource "google_network_security_backend_authentication_config" "default" {
2+ name = " my-backend-authentication-config-${ local . name_suffix } "
3+ labels = {
4+ foo = " bar"
5+ }
6+ description = " my description"
7+ well_known_roots = " PUBLIC_ROOTS"
8+ }
Original file line number Diff line number Diff line change 1+ ===
2+
3+ These examples use real resources that will be billed to the
4+ Google Cloud Platform project you use - so make sure that you
5+ run "terraform destroy" before quitting!
6+
7+ ===
Original file line number Diff line number Diff line change 1+ # Network Security Backend Authentication Config Basic - Terraform
2+
3+ ## Setup
4+
5+ <
walkthrough-author name =
" [email protected] " analyticsId =
" UA-125550242-1 " tutorialName =
" network_security_backend_authentication_config_basic " repositoryUrl =
" https://github.com/terraform-google-modules/docs-examples " ></
walkthrough-author >
6+
7+ Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform.
8+
9+ <walkthrough-project-billing-setup ></walkthrough-project-billing-setup >
10+
11+ Terraform provisions real GCP resources, so anything you create in this session will be billed against this project.
12+
13+ ## Terraforming!
14+
15+ Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command
16+ to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up
17+ the project name from the environment variable.
18+
19+ ``` bash
20+ export GOOGLE_CLOUD_PROJECT={{project-id}}
21+ ```
22+
23+ After that, let's get Terraform started. Run the following to pull in the providers.
24+
25+ ``` bash
26+ terraform init
27+ ```
28+
29+ With the providers downloaded and a project set, you're ready to use Terraform. Go ahead!
30+
31+ ``` bash
32+ terraform apply
33+ ```
34+
35+ Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan.
36+
37+ ``` bash
38+ yes
39+ ```
40+
41+
42+ ## Post-Apply
43+
44+ ### Editing your config
45+
46+ Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed.
47+
48+ ``` bash
49+ terraform plan
50+ ```
51+
52+ So let's make a change! Try editing a number, or appending a value to the name in the editor. Then,
53+ run a 'plan' again.
54+
55+ ``` bash
56+ terraform plan
57+ ```
58+
59+ Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes
60+ at the 'yes' prompt.
61+
62+ ``` bash
63+ terraform apply
64+ ```
65+
66+ ``` bash
67+ yes
68+ ```
69+
70+ ## Cleanup
71+
72+ Run the following to remove the resources Terraform provisioned:
73+
74+ ``` bash
75+ terraform destroy
76+ ```
77+ ``` bash
78+ yes
79+ ```
Original file line number Diff line number Diff line change 1+ # This file has some scaffolding to make sure that names are unique and that
2+ # a region and zone are selected when you try to create your Terraform resources.
3+
4+ locals {
5+ name_suffix = " ${ random_pet . suffix . id } "
6+ }
7+
8+ resource "random_pet" "suffix" {
9+ length = 2
10+ }
11+
12+ provider "google" {
13+ region = " us-central1"
14+ zone = " us-central1-c"
15+ }
Original file line number Diff line number Diff line change 1+ resource "google_certificate_manager_certificate" "certificate" {
2+ name = " my-certificate-${ local . name_suffix } "
3+ labels = {
4+ foo = " bar"
5+ }
6+ location = " global"
7+ self_managed {
8+ pem_certificate = file (" test-fixtures/cert.pem" )
9+ pem_private_key = file (" test-fixtures/key.pem" )
10+ }
11+ scope = " CLIENT_AUTH"
12+ }
13+
14+ resource "google_certificate_manager_trust_config" "trust_config" {
15+ name = " my-trust-config-${ local . name_suffix } "
16+ description = " sample description for the trust config"
17+ location = " global"
18+
19+ trust_stores {
20+ trust_anchors {
21+ pem_certificate = file (" test-fixtures/cert.pem" )
22+ }
23+ intermediate_cas {
24+ pem_certificate = file (" test-fixtures/cert.pem" )
25+ }
26+ }
27+
28+ labels = {
29+ foo = " bar"
30+ }
31+ }
32+
33+ resource "google_network_security_backend_authentication_config" "default" {
34+ name = " my-backend-authentication-config-${ local . name_suffix } "
35+ labels = {
36+ bar = " foo"
37+ }
38+ location = " global"
39+ description = " my description"
40+ well_known_roots = " PUBLIC_ROOTS"
41+ client_certificate = google_certificate_manager_certificate. certificate . id
42+ trust_config = google_certificate_manager_trust_config. trust_config . id
43+ }
Original file line number Diff line number Diff line change 1+ ===
2+
3+ These examples use real resources that will be billed to the
4+ Google Cloud Platform project you use - so make sure that you
5+ run "terraform destroy" before quitting!
6+
7+ ===
Original file line number Diff line number Diff line change 1+ # Network Security Backend Authentication Config Full - Terraform
2+
3+ ## Setup
4+
5+ <
walkthrough-author name =
" [email protected] " analyticsId =
" UA-125550242-1 " tutorialName =
" network_security_backend_authentication_config_full " repositoryUrl =
" https://github.com/terraform-google-modules/docs-examples " ></
walkthrough-author >
6+
7+ Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform.
8+
9+ <walkthrough-project-billing-setup ></walkthrough-project-billing-setup >
10+
11+ Terraform provisions real GCP resources, so anything you create in this session will be billed against this project.
12+
13+ ## Terraforming!
14+
15+ Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command
16+ to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up
17+ the project name from the environment variable.
18+
19+ ``` bash
20+ export GOOGLE_CLOUD_PROJECT={{project-id}}
21+ ```
22+
23+ After that, let's get Terraform started. Run the following to pull in the providers.
24+
25+ ``` bash
26+ terraform init
27+ ```
28+
29+ With the providers downloaded and a project set, you're ready to use Terraform. Go ahead!
30+
31+ ``` bash
32+ terraform apply
33+ ```
34+
35+ Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan.
36+
37+ ``` bash
38+ yes
39+ ```
40+
41+
42+ ## Post-Apply
43+
44+ ### Editing your config
45+
46+ Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed.
47+
48+ ``` bash
49+ terraform plan
50+ ```
51+
52+ So let's make a change! Try editing a number, or appending a value to the name in the editor. Then,
53+ run a 'plan' again.
54+
55+ ``` bash
56+ terraform plan
57+ ```
58+
59+ Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes
60+ at the 'yes' prompt.
61+
62+ ``` bash
63+ terraform apply
64+ ```
65+
66+ ``` bash
67+ yes
68+ ```
69+
70+ ## Cleanup
71+
72+ Run the following to remove the resources Terraform provisioned:
73+
74+ ``` bash
75+ terraform destroy
76+ ```
77+ ``` bash
78+ yes
79+ ```
You can’t perform that action at this time.
0 commit comments