Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save alexjmoore/ceb26f76f52653a17b520000f050f563 to your computer and use it in GitHub Desktop.
Save alexjmoore/ceb26f76f52653a17b520000f050f563 to your computer and use it in GitHub Desktop.
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# google_compute_firewall.fw-testa-allow-all-internal will be created
+ resource "google_compute_firewall" "fw-testa-allow-all-internal" {
+ creation_timestamp = (known after apply)
+ destination_ranges = (known after apply)
+ direction = (known after apply)
+ enable_logging = (known after apply)
+ id = (known after apply)
+ name = "fw-testa-allow-all-internal"
+ network = "vpc-testa"
+ priority = 1000
+ project = (known after apply)
+ self_link = (known after apply)
+ source_ranges = [
+ "10.0.0.0/24",
]
+ allow {
+ ports = []
+ protocol = "all"
}
}
# google_compute_firewall.fw-testa-allow-iap will be created
+ resource "google_compute_firewall" "fw-testa-allow-iap" {
+ creation_timestamp = (known after apply)
+ destination_ranges = (known after apply)
+ direction = (known after apply)
+ enable_logging = (known after apply)
+ id = (known after apply)
+ name = "fw-testa-allow-iap"
+ network = "vpc-testa"
+ priority = 1000
+ project = (known after apply)
+ self_link = (known after apply)
+ source_ranges = [
+ "35.235.240.0/20",
]
+ target_tags = [
+ "bastion-host",
]
+ allow {
+ ports = [
+ "22",
+ "3389",
]
+ protocol = "tcp"
}
}
# google_compute_firewall.fw-testb-allow-all-from-testa will be created
+ resource "google_compute_firewall" "fw-testb-allow-all-from-testa" {
+ creation_timestamp = (known after apply)
+ destination_ranges = (known after apply)
+ direction = (known after apply)
+ enable_logging = (known after apply)
+ id = (known after apply)
+ name = "fw-testb-allow-all-from-testa"
+ network = "vpc-testb"
+ priority = 1000
+ project = (known after apply)
+ self_link = (known after apply)
+ source_ranges = [
+ "10.0.0.0/24",
]
+ allow {
+ ports = []
+ protocol = "all"
}
}
# google_compute_ha_vpn_gateway.vgw-testa will be created
+ resource "google_compute_ha_vpn_gateway" "vgw-testa" {
+ id = (known after apply)
+ name = "vgw-testa"
+ network = "vpc-testa"
+ project = (known after apply)
+ region = "europe-west2"
+ self_link = (known after apply)
+ vpn_interfaces = (known after apply)
}
# google_compute_ha_vpn_gateway.vgw-testb will be created
+ resource "google_compute_ha_vpn_gateway" "vgw-testb" {
+ id = (known after apply)
+ name = "vgw-testb"
+ network = "vpc-testb"
+ project = (known after apply)
+ region = "europe-west2"
+ self_link = (known after apply)
+ vpn_interfaces = (known after apply)
}
# module.vpc-testa.module.subnets.google_compute_subnetwork.subnetwork["europe-west2/sn-testa"] will be created
+ resource "google_compute_subnetwork" "subnetwork" {
+ creation_timestamp = (known after apply)
+ fingerprint = (known after apply)
+ gateway_address = (known after apply)
+ id = (known after apply)
+ ip_cidr_range = "10.0.0.0/24"
+ name = "sn-testa"
+ network = "vpc-testa"
+ private_ip_google_access = false
+ private_ipv6_google_access = (known after apply)
+ project = "testproject"
+ region = "europe-west2"
+ secondary_ip_range = []
+ self_link = (known after apply)
}
# module.vpc-testa.module.vpc.google_compute_network.network will be created
+ resource "google_compute_network" "network" {
+ auto_create_subnetworks = false
+ delete_default_routes_on_create = false
+ gateway_ipv4 = (known after apply)
+ id = (known after apply)
+ mtu = 0
+ name = "vpc-testa"
+ project = "testproject"
+ routing_mode = "GLOBAL"
+ self_link = (known after apply)
}
# module.vpc-testb.module.subnets.google_compute_subnetwork.subnetwork["europe-west2/sn-testb"] will be created
+ resource "google_compute_subnetwork" "subnetwork" {
+ creation_timestamp = (known after apply)
+ fingerprint = (known after apply)
+ gateway_address = (known after apply)
+ id = (known after apply)
+ ip_cidr_range = "10.0.1.0/24"
+ name = "sn-testb"
+ network = "vpc-testb"
+ private_ip_google_access = false
+ private_ipv6_google_access = (known after apply)
+ project = "testproject"
+ region = "europe-west2"
+ secondary_ip_range = []
+ self_link = (known after apply)
}
# module.vpc-testb.module.vpc.google_compute_network.network will be created
+ resource "google_compute_network" "network" {
+ auto_create_subnetworks = false
+ delete_default_routes_on_create = false
+ gateway_ipv4 = (known after apply)
+ id = (known after apply)
+ mtu = 0
+ name = "vpc-testb"
+ project = "testproject"
+ routing_mode = "GLOBAL"
+ self_link = (known after apply)
}
Plan: 9 to add, 0 to change, 0 to destroy.
Warning: Interpolation-only expressions are deprecated
on .terraform/modules/vpc-testa/modules/firewall-rules/main.tf line 18, in resource "google_compute_firewall" "rules":
18: for_each = { for r in var.rules : "${r.name}" => r }
Terraform 0.11 and earlier required all non-constant expressions to be
provided via interpolation syntax, but this pattern is now deprecated. To
silence this warning, remove the "${ sequence from the start and the }"
sequence from the end of this expression, leaving just the inner expression.
Template interpolation syntax is still used to construct strings from
expressions when the template includes multiple interpolation sequences or a
mixture of literal strings and interpolations. This deprecation applies only
to templates that consist entirely of a single interpolation sequence.
(and one more similar warning elsewhere)
------------------------------------------------------------------------
Note: You didn't specify an "-out" parameter to save this plan, so Terraform
can't guarantee that exactly these actions will be performed if
"terraform apply" is subsequently run.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment