-
Notifications
You must be signed in to change notification settings - Fork 24
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #132 from nosportugal/network-policy
feat: add option to attach a security policy to the default backend
- Loading branch information
Showing
6 changed files
with
178 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
# Example usage | ||
|
||
This example deploys Cloud Armor to ensure requests to the default backend are coming from GitHub Webhooks. | ||
|
||
Since IAP is enabled, two backend services will be created: | ||
|
||
- atlantis: the backend to receive GitHub events, protected with Cloud Armor | ||
- atlantis-iap: the backend to serve the Atlantis UI, protected with IAP | ||
|
||
Read through the below before you deploy this module. | ||
|
||
- [Prerequisites](#prerequisites) | ||
- [How to deploy](#how-to-deploy) | ||
- [After it's successfully deployed](#after-its-successfully-deployed) | ||
|
||
## Prerequisites | ||
|
||
This module expects that you already own or create the below resources yourself. | ||
|
||
- Google network, subnetwork and a Cloud NAT | ||
- Service account, [specifics can be found here](../../README.md#service-account) | ||
- Domain, [specifics can be found here](../../README.md#dns-record) | ||
|
||
If you prefer an example that includes the above resources, see [`complete example`](https://github.com/bschaatsbergen/atlantis-on-gcp-vm/tree/master/examples/complete). | ||
|
||
## How to deploy | ||
|
||
See [`main.tf`](https://github.com/bschaatsbergen/atlantis-on-gcp-vm/tree/master/examples/basic/main.tf) and the [`server-atlantis.yaml`](https://github.com/bschaatsbergen/atlantis-on-gcp-vm/tree/master/examples/basic/server-atlantis.yaml). | ||
|
||
## After it's successfully deployed | ||
|
||
Once you're done, see [Configuring Webhooks for Atlantis](https://www.runatlantis.io/docs/configuring-webhooks.html#configuring-webhooks) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,130 @@ | ||
locals { | ||
project_id = "<your-project-id>" | ||
network = "<your-network>" | ||
subnetwork = "<your-subnetwork>" | ||
region = "<your-region>" | ||
zone = "<your-zone>" | ||
domain = "<example.com>" | ||
managed_zone = "<your-managed-zone>" | ||
|
||
github_repo_allow_list = "github.com/example/*" | ||
github_user = "<your-github-handle>" | ||
github_token = "<your-github-user>" | ||
github_webhook_secret = "<your-github-webhook-secret>" | ||
|
||
google_iap_brand_name = "<brand-name>" | ||
} | ||
|
||
# Create a service account and attach the required Cloud Logging permissions to it. | ||
resource "google_service_account" "atlantis" { | ||
account_id = "atlantis" | ||
display_name = "Service Account for Atlantis" | ||
project = local.project_id | ||
} | ||
|
||
resource "google_project_iam_member" "atlantis_log_writer" { | ||
role = "roles/logging.logWriter" | ||
member = "serviceAccount:${google_service_account.atlantis.email}" | ||
project = local.project_id | ||
} | ||
|
||
resource "google_project_iam_member" "atlantis_metric_writer" { | ||
role = "roles/monitoring.metricWriter" | ||
member = "serviceAccount:${google_service_account.atlantis.email}" | ||
project = local.project_id | ||
} | ||
|
||
module "atlantis" { | ||
source = "bschaatsbergen/atlantis/gce" | ||
name = "atlantis" | ||
network = local.network | ||
subnetwork = local.subnetwork | ||
region = local.region | ||
zone = local.zone | ||
service_account = { | ||
email = google_service_account.atlantis.email | ||
scopes = ["cloud-platform"] | ||
} | ||
# Note: environment variables are shown in the Google Cloud UI | ||
# See the `examples/secure-env-vars` if you want to protect sensitive information | ||
env_vars = { | ||
ATLANTIS_GH_USER = local.github_user | ||
ATLANTIS_GH_TOKEN = local.github_token | ||
ATLANTIS_GH_WEBHOOK_SECRET = local.github_webhook_secret | ||
ATLANTIS_REPO_ALLOWLIST = local.github_repo_allow_list | ||
ATLANTIS_ATLANTIS_URL = "https://${local.domain}" | ||
ATLANTIS_REPO_CONFIG_JSON = jsonencode(yamldecode(file("${path.module}/server-atlantis.yaml"))) | ||
} | ||
domain = local.domain | ||
project = local.project_id | ||
|
||
default_backend_security_policy = google_compute_security_policy.atlantis.name | ||
|
||
iap = { | ||
oauth2_client_id = google_iap_client.atlantis.client_id | ||
oauth2_client_secret = google_iap_client.atlantis.secret | ||
} | ||
} | ||
|
||
# As your DNS records might be managed at another registrar's site, we create the DNS record outside of the module. | ||
# This record is mandatory in order to provision the managed SSL certificate successfully. | ||
resource "google_dns_record_set" "default" { | ||
name = "${local.domain}." | ||
type = "A" | ||
ttl = 60 | ||
managed_zone = local.managed_zone | ||
rrdatas = [ | ||
module.atlantis.ip_address | ||
] | ||
project = local.project_id | ||
} | ||
|
||
resource "google_compute_security_policy" "atlantis" { | ||
name = "atlantis-security-policy" | ||
description = "Policy blocking all traffic except from Github Webhooks" | ||
project = local.project_id | ||
|
||
rule { | ||
# Allow from GitHub Webhooks | ||
# https://api.github.com/meta | ||
action = "allow" | ||
priority = "2" | ||
description = "Rule: Allow github hooks" | ||
match { | ||
expr { | ||
expression = "(inIpRange(origin.ip, '140.82.112.0/20') || inIpRange(origin.ip, '185.199.108.0/22') || inIpRange(origin.ip, '143.55.64.0/20') || inIpRange(origin.ip, '192.30.252.0/22'))" | ||
} | ||
} | ||
} | ||
|
||
rule { | ||
# Deny all by default | ||
action = "deny(403)" | ||
priority = "2147483647" | ||
description = "Default rule: deny all" | ||
|
||
match { | ||
versioned_expr = "SRC_IPS_V1" | ||
config { | ||
src_ip_ranges = ["*"] | ||
} | ||
} | ||
} | ||
|
||
rule { | ||
# Log4j vulnerability | ||
action = "deny(403)" | ||
priority = "1" | ||
description = "CVE-2021-44228 (https://nvd.nist.gov/vuln/detail/CVE-2021-44228)" | ||
match { | ||
expr { | ||
expression = "evaluatePreconfiguredExpr('cve-canary')" | ||
} | ||
} | ||
} | ||
} | ||
|
||
resource "google_iap_client" "atlantis" { | ||
display_name = "iap-client" | ||
brand = local.google_iap_brand_name | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
repos: | ||
- id: /.*/ | ||
apply_requirements: [mergeable] | ||
allowed_overrides: [apply_requirements, workflow] | ||
allow_custom_workflows: true | ||
delete_source_branch_on_merge: true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters