Skip to content

Commit

Permalink
Merge pull request #1613 from cloud-gov/cidr_blocks
Browse files Browse the repository at this point in the history
Switch to list of ip cidrs to block
  • Loading branch information
cweibel authored Mar 15, 2024
2 parents 1209de8 + ccacc7b commit 9b2956a
Show file tree
Hide file tree
Showing 9 changed files with 32 additions and 29 deletions.
6 changes: 3 additions & 3 deletions ci/pipeline.yml
Original file line number Diff line number Diff line change
Expand Up @@ -523,7 +523,7 @@ jobs:
TF_VAR_customer_whitelist_source_ip_ranges_set_arn: ((customer_whitelist_source_ip_ranges_set_arn))
TF_VAR_internal_vpc_cidrs_set_arn: ((internal_vpc_cidrs_set_arn))
TF_VAR_cg_egress_ip_set_arn: ((cg_egress_ip_set_arn))
TF_VAR_block_range_20: ((block_range_20))
TF_VAR_cidr_blocks: ((cidr_blocks))
- *notify-slack

- name: bootstrap-development
Expand Down Expand Up @@ -684,7 +684,7 @@ jobs:
TF_VAR_customer_whitelist_source_ip_ranges_set_arn: ((customer_whitelist_source_ip_ranges_set_arn))
TF_VAR_internal_vpc_cidrs_set_arn: ((internal_vpc_cidrs_set_arn))
TF_VAR_cg_egress_ip_set_arn: ((cg_egress_ip_set_arn))
TF_VAR_block_range_20: ((block_range_20))
TF_VAR_cidr_blocks: ((cidr_blocks))
- *notify-slack

- name: bootstrap-staging
Expand Down Expand Up @@ -843,7 +843,7 @@ jobs:
TF_VAR_customer_whitelist_source_ip_ranges_set_arn: ((customer_whitelist_source_ip_ranges_set_arn))
TF_VAR_internal_vpc_cidrs_set_arn: ((internal_vpc_cidrs_set_arn))
TF_VAR_cg_egress_ip_set_arn: ((cg_egress_ip_set_arn))
TF_VAR_block_range_20: ((block_range_20))
TF_VAR_cidr_blocks: ((cidr_blocks))

- *notify-slack

Expand Down
9 changes: 5 additions & 4 deletions terraform/modules/bosh_vpc/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,8 @@ variable "s3_gateway_policy_accounts" {
default = []
}

#Placeholder for real value, passed as a secret
variable "block_range_20" {
default = "192.168.0.0/32"
}
variable "cidr_blocks" {
type = list(string)
default = []
}

22 changes: 12 additions & 10 deletions terraform/modules/bosh_vpc/vpc.tf
Original file line number Diff line number Diff line change
Expand Up @@ -78,25 +78,27 @@ data "aws_network_acls" "default" {
vpc_id = aws_vpc.main_vpc.id
}

resource "aws_network_acl_rule" "deny_rule_ingress_rule_20" {
count = length(data.aws_network_acls.default.ids)
rule_number = 20
network_acl_id = data.aws_network_acls.default.ids[count.index]
resource "aws_network_acl_rule" "deny_rule_ingress_rules" {
count = length(var.cidr_blocks)

rule_number = 20 + count.index
network_acl_id = data.aws_network_acls.default.ids[0]
rule_action = "deny"
protocol = "-1"
cidr_block = var.block_range_20
cidr_block = var.cidr_blocks[count.index]
from_port = 0
to_port = 0
egress = false
}

resource "aws_network_acl_rule" "deny_rule_egress_rule_20" {
count = length(data.aws_network_acls.default.ids)
rule_number = 20
network_acl_id = data.aws_network_acls.default.ids[count.index]
resource "aws_network_acl_rule" "deny_rule_egress_rules" {
count = length(var.cidr_blocks)

rule_number = 20 + count.index
network_acl_id = data.aws_network_acls.default.ids[0]
rule_action = "deny"
protocol = "-1"
cidr_block = var.block_range_20
cidr_block = var.cidr_blocks[count.index]
from_port = 0
to_port = 0
egress = true
Expand Down
2 changes: 1 addition & 1 deletion terraform/modules/stack/base/base.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ module "vpc" {
concourse_security_group_cidrs = var.target_concourse_security_group_cidrs
bosh_default_ssh_public_key = var.bosh_default_ssh_public_key
s3_gateway_policy_accounts = var.s3_gateway_policy_accounts
block_range_20 = var.block_range_20
cidr_blocks = var.cidr_blocks
}

module "rds_network" {
Expand Down
6 changes: 3 additions & 3 deletions terraform/modules/stack/base/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -186,7 +186,7 @@ variable "s3_gateway_policy_accounts" {
}


#Placeholder for real value, passed as a secret
variable "block_range_20" {
default = "192.168.0.0/32"
variable "cidr_blocks" {
type = list(string)
default = []
}
2 changes: 1 addition & 1 deletion terraform/modules/stack/spoke/spoke.tf
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ module "base" {
restricted_ingress_web_ipv6_cidrs = var.restricted_ingress_web_ipv6_cidrs
bosh_default_ssh_public_key = var.bosh_default_ssh_public_key
s3_gateway_policy_accounts = var.s3_gateway_policy_accounts
block_range_20 = var.block_range_20
cidr_blocks = var.cidr_blocks

rds_security_groups = [
module.base.bosh_security_group,
Expand Down
6 changes: 3 additions & 3 deletions terraform/modules/stack/spoke/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -169,7 +169,7 @@ variable "s3_gateway_policy_accounts" {
}


#Placeholder for real value, passed as a secret
variable "block_range_20" {
default = "192.168.0.0/32"
variable "cidr_blocks" {
type = list(string)
default = []
}
2 changes: 1 addition & 1 deletion terraform/stacks/main/stack.tf
Original file line number Diff line number Diff line change
Expand Up @@ -213,7 +213,7 @@ module "stack" {
target_account_id = data.aws_caller_identity.tooling.account_id
bosh_default_ssh_public_key = var.bosh_default_ssh_public_key
s3_gateway_policy_accounts = var.s3_gateway_policy_accounts
block_range_20 = var.block_range_20
cidr_blocks = var.cidr_blocks

target_vpc_id = data.terraform_remote_state.target_vpc.outputs.vpc_id
target_vpc_cidr = data.terraform_remote_state.target_vpc.outputs.production_concourse_subnet_cidr
Expand Down
6 changes: 3 additions & 3 deletions terraform/stacks/main/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -204,7 +204,7 @@ variable "cg_egress_ip_set_arn" {
description = "ARN of IP set identifying egress IP CIDR ranges for cloud.gov"
}

#Placeholder for real value, passed as a secret
variable "block_range_20" {
default = "192.168.0.0/32"
variable "cidr_blocks" {
type = list(string)
default = []
}

0 comments on commit 9b2956a

Please sign in to comment.