-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add VPC endpoints #93
Merged
Merged
Changes from all commits
Commits
Show all changes
23 commits
Select commit
Hold shift + click to select a range
6b091f0
Remove NAT gateway and associated route
jsf9k a16b36a
Use a single route table for all private subnets
jsf9k da4cf75
Add permissions for creating, modifying, and deleting VPC endpoints
jsf9k 6e68e6d
Add security groups for instances using VPC endpoints to access the S…
jsf9k b1e39fa
Add VPC endpoints requires to use the STS, SSM, and S3 services
jsf9k 1464d41
Add a route for S3 access via the S3 VPC gateway endpoint
jsf9k 1941acd
Modify desktop gateway SG rules to use VPC endpoints
jsf9k f108ee6
Add some CloudWatch VPC interface endpoints
jsf9k 62be561
Allow operations subnet to use the VPC endpoints in private subnet
jsf9k d3ee217
Add a route so the operations subnet can use the S3 gateway endpoint
jsf9k 597a541
Revert "Remove NAT gateway and associated route"
jsf9k a8ec8bb
Add SG and ACL rules to allow guacamole to use the NAT GW for HTTPS
jsf9k 7095452
Improve some ACL rule comments
jsf9k 24d3c09
Allow the operations subnet to use the STS VPC endpoint
jsf9k 6bc7a6a
Specify the region name and region-specific endpoint URL for boto3 ST…
jsf9k 864048c
Specify the region name and region-specific endpoint URL for AWS CLI …
jsf9k 93fa57e
Consistently name AWS region variable
jsf9k 5c087ea
Add issue link to a comment
jsf9k 5a40a3a
Update comment to agree with reality
jsf9k 02d26ca
Capitalize "Guacamole" and "Docker" in comments
jsf9k 2d42f57
Add comments to clearly separate VPC interface and gateway endpoints
jsf9k 9ad872d
Clean up comment formatting
jsf9k d9efdca
Reword comment for consistency with similar comments made elsewhere
jsf9k File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
# Allow ingress via HTTPS from the desktop gateway security group | ||
resource "aws_security_group_rule" "ingress_from_desktop_gw_to_cloudwatch_via_https" { | ||
provider = aws.provisionassessment | ||
|
||
security_group_id = aws_security_group.cloudwatch.id | ||
type = "ingress" | ||
protocol = "tcp" | ||
source_security_group_id = aws_security_group.desktop_gateway.id | ||
from_port = 443 | ||
to_port = 443 | ||
} | ||
|
||
# Allow ingress via HTTPS from the operations security group | ||
resource "aws_security_group_rule" "ingress_from_operations_to_cloudwatch_via_https" { | ||
provider = aws.provisionassessment | ||
|
||
security_group_id = aws_security_group.cloudwatch.id | ||
type = "ingress" | ||
protocol = "tcp" | ||
source_security_group_id = aws_security_group.operations.id | ||
from_port = 443 | ||
to_port = 443 | ||
} | ||
|
||
# Allow ingress via HTTPS from the PenTest Portal security group | ||
resource "aws_security_group_rule" "ingress_from_pentestportal_to_cloudwatch_via_https" { | ||
provider = aws.provisionassessment | ||
|
||
security_group_id = aws_security_group.cloudwatch.id | ||
type = "ingress" | ||
protocol = "tcp" | ||
source_security_group_id = aws_security_group.pentestportal.id | ||
from_port = 443 | ||
to_port = 443 | ||
} | ||
|
||
# Allow ingress via HTTPS from the Debian Desktop security group | ||
resource "aws_security_group_rule" "ingress_from_debiandesktop_to_cloudwatch_via_https" { | ||
provider = aws.provisionassessment | ||
|
||
security_group_id = aws_security_group.cloudwatch.id | ||
type = "ingress" | ||
protocol = "tcp" | ||
source_security_group_id = aws_security_group.debiandesktop.id | ||
from_port = 443 | ||
to_port = 443 | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🤣