-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Dbtp 946 vpc store nat egress ips in parameter store #157
feat: Dbtp 946 vpc store nat egress ips in parameter store #157
Conversation
### Test aws_security_group resource ### | ||
assert { | ||
condition = startswith(aws_security_group.vpc-core-sg.arn, "arn:aws:ec2:eu-west-2:852676506468:security-group/sg-") == true | ||
condition = length(regexall("|(arn:aws:ec2:eu-west-2:)[0-9]{12,14}(:security-group/sg-)|", aws_security_group.vpc-core-sg.arn)) > 0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The hard coded account number was causing this test to fail.
# checkov:skip=CKV_AWS_337:Ensure SSM parameters are using KMS CMK. Related ticket: https://uktrade.atlassian.net/browse/DBTP-946 | ||
# checkov:skip=CKV2_AWS_34:AWS SSM Parameter should be Encrypted. Related ticket: https://uktrade.atlassian.net/browse/DBTP-946 | ||
for_each = toset(var.arg_config.nat_gateways) | ||
name = "/${var.arg_name}/nat-eip-${each.key}/ADDITIONAL_IP_LIST" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@ejayesh in the ticket (https://uktrade.atlassian.net/jira/software/c/projects/DBTP/boards/458?quickFilter=882&selectedIssue=DBTP-946) it says to call it /ADDITIONAL_IP_LIST, but also in the ticket it says that we are not to add the parameter to a list.
Any clarification around this please?
Co-authored-by: Will Gibson <[email protected]>
DBTP-946 VPC module - store NAT egress IPs in parameter store
Creates an SSM parameter for each VPC that contains a NAT gateway egress EIP public IP address.
VALUE: This can then be passed into the IP filter when it needs to allow internal traffic
Currently skipping 2 Checkov alerts, discussion to be had as to whether these need a KMS key & SecureString type:
SSM params: