Last active
October 25, 2024 15:02
-
-
Save Tensho/924eefb126ee1f38c60c46988eed12a8 to your computer and use it in GitHub Desktop.
Revisions
-
Tensho revised this gist
Oct 25, 2024 . 1 changed file with 2 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -29,10 +29,10 @@ resource "google_compute_security_policy" "default" { match { versioned_expr = "SRC_IPS_V1" config { src_ip_ranges = ["22.22.22.22/32"] } } description = "Deny access to IPs in 22.22.22.22/32" } rule { -
Tensho revised this gist
Oct 25, 2024 . 1 changed file with 12 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -23,6 +23,18 @@ resource "google_compute_security_policy" "default" { description = "Deny access to IPs in 1.1.1.1/32" } rule { action = "deny(403)" priority = "2000" match { versioned_expr = "SRC_IPS_V1" config { src_ip_ranges = ["2.2.2.2/32"] } } description = "Deny access to IPs in 2.2.2.2/32" } rule { action = "allow" priority = "2147483647" -
Tensho created this gist
Oct 25, 2024 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,37 @@ terraform { required_providers { google = { source = "hashicorp/google" version = "~> 6.8" } } } resource "google_compute_security_policy" "default" { name = "test" description = "https://github.com/GoogleCloudPlatform/terraform-google-cloud-armor/issues/136" rule { action = "deny(403)" priority = "1000" match { versioned_expr = "SRC_IPS_V1" config { src_ip_ranges = ["1.1.1.1/32"] } } description = "Deny access to IPs in 1.1.1.1/32" } rule { action = "allow" priority = "2147483647" match { versioned_expr = "SRC_IPS_V1" config { src_ip_ranges = ["*"] } } description = "Default rule" } }