Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/launchbynttdata/tf-azurerm-module_collection-hub_network


https://github.com/launchbynttdata/tf-azurerm-module_collection-hub_network

azure collection terraform

Last synced: 20 days ago
JSON representation

Awesome Lists containing this project

README

        

# tf-azurerm-module_collection-hub_network

[![License](https://img.shields.io/badge/License-Apache_2.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
[![License: CC BY-NC-ND 4.0](https://img.shields.io/badge/License-CC_BY--NC--ND_4.0-lightgrey.svg)](https://creativecommons.org/licenses/by-nc-nd/4.0/)

## Overview

This module
- Creates the standard names for the resources to be deployed
- Creates
- Resource group for the VNET and related resource's
- Virtual network to be treated as hub virtual network
- Firewall along with private and public IP addresses
- Firewall Policy
- Rules attached to the policy

## Pre-Commit hooks

[.pre-commit-config.yaml](.pre-commit-config.yaml) file defines certain `pre-commit` hooks that are relevant to terraform, golang and common linting tasks. There are no custom hooks added.

`commitlint` hook enforces commit message in certain format. The commit contains the following structural elements, to communicate intent to the consumers of your commit messages:

- **fix**: a commit of the type `fix` patches a bug in your codebase (this correlates with PATCH in Semantic Versioning).
- **feat**: a commit of the type `feat` introduces a new feature to the codebase (this correlates with MINOR in Semantic Versioning).
- **BREAKING CHANGE**: a commit that has a footer `BREAKING CHANGE:`, or appends a `!` after the type/scope, introduces a breaking API change (correlating with MAJOR in Semantic Versioning). A BREAKING CHANGE can be part of commits of any type.
footers other than BREAKING CHANGE: may be provided and follow a convention similar to git trailer format.
- **build**: a commit of the type `build` adds changes that affect the build system or external dependencies (example scopes: gulp, broccoli, npm)
- **chore**: a commit of the type `chore` adds changes that don't modify src or test files
- **ci**: a commit of the type `ci` adds changes to our CI configuration files and scripts (example scopes: Travis, Circle, BrowserStack, SauceLabs)
- **docs**: a commit of the type `docs` adds documentation only changes
- **perf**: a commit of the type `perf` adds code change that improves performance
- **refactor**: a commit of the type `refactor` adds code change that neither fixes a bug nor adds a feature
- **revert**: a commit of the type `revert` reverts a previous commit
- **style**: a commit of the type `style` adds code changes that do not affect the meaning of the code (white-space, formatting, missing semi-colons, etc)
- **test**: a commit of the type `test` adds missing tests or correcting existing tests

Base configuration used for this project is [commitlint-config-conventional (based on the Angular convention)](https://github.com/conventional-changelog/commitlint/tree/master/@commitlint/config-conventional#type-enum)

If you are a developer using vscode, [this](https://marketplace.visualstudio.com/items?itemName=joshbolduc.commitlint) plugin may be helpful.

`detect-secrets-hook` prevents new secrets from being introduced into the baseline. TODO: INSERT DOC LINK ABOUT HOOKS

In order for `pre-commit` hooks to work properly

- You need to have the pre-commit package manager installed. [Here](https://pre-commit.com/#install) are the installation instructions.
- `pre-commit` would install all the hooks when commit message is added by default except for `commitlint` hook. `commitlint` hook would need to be installed manually using the command below

```
pre-commit install --hook-type commit-msg
```

## To test the resource group module locally

1. For development/enhancements to this module locally, you'll need to install all of its components. This is controlled by the `configure` target in the project's [`Makefile`](./Makefile). Before you can run `configure`, familiarize yourself with the variables in the `Makefile` and ensure they're pointing to the right places.

```
make configure
```

This adds in several files and directories that are ignored by `git`. They expose many new Make targets.

2. _THIS STEP APPLIES ONLY TO MICROSOFT AZURE. IF YOU ARE USING A DIFFERENT PLATFORM PLEASE SKIP THIS STEP._ The first target you care about is `env`. This is the common interface for setting up environment variables. The values of the environment variables will be used to authenticate with cloud provider from local development workstation.

`make configure` command will bring down `azure_env.sh` file on local workstation. Devloper would need to modify this file, replace the environment variable values with relevant values.

These environment variables are used by `terratest` integration suit.

Service principle used for authentication(value of ARM_CLIENT_ID) should have below privileges on resource group within the subscription.

```
"Microsoft.Resources/subscriptions/resourceGroups/write"
"Microsoft.Resources/subscriptions/resourceGroups/read"
"Microsoft.Resources/subscriptions/resourceGroups/delete"
```

Then run this make target to set the environment variables on developer workstation.

```
make env
```

3. The first target you care about is `check`.

**Pre-requisites**
Before running this target it is important to ensure that, developer has created files mentioned below on local workstation under root directory of git repository that contains code for primitives/segments. Note that these files are `azure` specific. If primitive/segment under development uses any other cloud provider than azure, this section may not be relevant.

- A file named `provider.tf` with contents below

```
provider "azurerm" {
features {}
}
```

- A file named `terraform.tfvars` which contains key value pair of variables used.

Note that since these files are added in `gitignore` they would not be checked in into primitive/segment's git repo.

After creating these files, for running tests associated with the primitive/segment, run

```
make check
```

If `make check` target is successful, developer is good to commit the code to primitive/segment's git repo.

`make check` target

- runs `terraform commands` to `lint`,`validate` and `plan` terraform code.
- runs `conftests`. `conftests` make sure `policy` checks are successful.
- runs `terratest`. This is integration test suit.
- runs `opa` tests

## Requirements

| Name | Version |
|------|---------|
| [terraform](#requirement\_terraform) | <= 1.5.5 |
| [azurerm](#requirement\_azurerm) | ~> 3.77 |

## Providers

No providers.

## Modules

| Name | Source | Version |
|------|--------|---------|
| [resource\_names](#module\_resource\_names) | terraform.registry.launch.nttdata.com/module_library/resource_name/launch | ~> 1.0 |
| [resource\_group](#module\_resource\_group) | terraform.registry.launch.nttdata.com/module_primitive/resource_group/azurerm | ~> 1.0 |
| [network](#module\_network) | terraform.registry.launch.nttdata.com/module_collection/virtual_network/azurerm | ~> 1.0 |
| [firewall](#module\_firewall) | terraform.registry.launch.nttdata.com/module_primitive/firewall/azurerm | ~> 1.0 |
| [firewall\_policy](#module\_firewall\_policy) | terraform.registry.launch.nttdata.com/module_primitive/firewall_policy/azurerm | ~> 1.0 |
| [firewall\_policy\_rule\_collection\_group](#module\_firewall\_policy\_rule\_collection\_group) | terraform.registry.launch.nttdata.com/module_primitive/firewall_policy_rule_collection_group/azurerm | ~> 1.0 |

## Resources

No resources.

## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| [resource\_names\_map](#input\_resource\_names\_map) | A map of key to resource\_name that will be used by tf-launch-module\_library-resource\_name to generate resource names |

map(object({
name = string
max_length = optional(number, 60)
region = optional(string, "eastus2")
}))
|
{
"firewall": {
"max_length": 80,
"name": "fw"
},
"firewall_policy": {
"max_length": 80,
"name": "fwplcy"
},
"fw_plcy_rule_colln_grp": {
"max_length": 80,
"name": "fwplcyrulecollngrp"
},
"hub_vnet": {
"max_length": 80,
"name": "hubvnet"
},
"hub_vnet_ip_configuration": {
"max_length": 80,
"name": "ipconfig"
},
"log_analytics_workspace": {
"max_length": 80,
"name": "law"
},
"public_ip": {
"max_length": 80,
"name": "pip"
},
"resource_group": {
"max_length": 80,
"name": "hubrg"
}
}
| no |
| [instance\_env](#input\_instance\_env) | Number that represents the instance of the environment. | `number` | `0` | no |
| [instance\_resource](#input\_instance\_resource) | Number that represents the instance of the resource. | `number` | `0` | no |
| [logical\_product\_family](#input\_logical\_product\_family) | (Required) Name of the product family for which the resource is created.
Example: org\_name, department\_name. | `string` | `"launch"` | no |
| [logical\_product\_service](#input\_logical\_product\_service) | (Required) Name of the product service for which the resource is created.
For example, backend, frontend, middleware etc. | `string` | `"network"` | no |
| [class\_env](#input\_class\_env) | (Required) Environment where resource is going to be deployed. For example. dev, qa, uat | `string` | `"dev"` | no |
| [network](#input\_network) | Attributes of virtual network to be created. |
object({
use_for_each = bool
address_space = optional(list(string), ["10.0.0.0/16"])
subnet_names = optional(list(string), [])
subnet_prefixes = optional(list(string), [])
bgp_community = optional(string, null)
ddos_protection_plan = optional(object(
{
enable = bool
id = string
}
), null)
dns_servers = optional(list(string), [])
nsg_ids = optional(map(string), {})
route_tables_ids = optional(map(string), {})
subnet_delegation = optional(map(map(any)), {})
subnet_enforce_private_link_endpoint_network_policies = optional(map(bool), {})
subnet_enforce_private_link_service_network_policies = optional(map(bool), {})
subnet_service_endpoints = optional(map(list(string)), {})
tags = optional(map(string), {})
tracing_tags_enabled = optional(bool, false)
tracing_tags_prefix = optional(string, "")
})
| n/a | yes |
| [location](#input\_location) | Azure region to use | `string` | n/a | yes |
| [firewall](#input\_firewall) | Attributes to create a azure firewall |
object({
logs_destinations_ids = list(string)
subnet_cidr = optional(string)
additional_public_ips = optional(list(object(
{
name = string,
public_ip_address_id = string
})), [])
application_rule_collections = optional(list(object(
{
name = string,
priority = number,
action = string,
rules = list(object(
{ name = string,
source_addresses = list(string),
source_ip_groups = list(string),
target_fqdns = list(string),
protocols = list(object(
{ port = string,
type = string }))
}
))
})))
custom_diagnostic_settings_name = optional(string)
custom_firewall_name = optional(string)
dns_servers = optional(string)
extra_tags = optional(map(string))
firewall_private_ip_ranges = optional(list(string))
ip_configuration_name = optional(string)
network_rule_collections = optional(list(object({
name = string,
priority = number,
action = string,
rules = list(object({
name = string,
source_addresses = list(string),
source_ip_groups = optional(list(string)),
destination_ports = list(string),
destination_addresses = list(string),
destination_ip_groups = optional(list(string)),
destination_fqdns = optional(list(string)),
protocols = list(string)
}))
})))
public_ip_zones = optional(list(number))
sku_tier = string
zones = optional(list(number))
})
| `null` | no |
| [firewall\_policy\_rule\_collection\_group\_priority](#input\_firewall\_policy\_rule\_collection\_group\_priority) | (Required) The priority of the Firewall Policy Rule Collection Group. The range is 100-65000. | `number` | n/a | yes |
| [application\_rule\_collection](#input\_application\_rule\_collection) | (Optional) The Application Rule Collection to use in this Firewall Policy Rule Collection Group. |
list(object({
name = string
action = string
priority = number
rule = list(object({
name = string
description = optional(string)
protocols = optional(list(object({
type = string
port = number
})))
http_headers = optional(list(object({
name = string
value = string
})))
source_addresses = optional(list(string))
source_ip_groups = optional(list(string))
destination_addresses = optional(list(string))
destination_urls = optional(list(string))
destination_fqdns = optional(list(string))
destination_fqdn_tags = optional(list(string))
terminate_tls = optional(bool)
web_categories = optional(list(string))
}))
}))
| `[]` | no |
| [network\_rule\_collection](#input\_network\_rule\_collection) | (Optional) The Network Rule Collection to use in this Firewall Policy Rule Collection Group. |
list(object({
name = string
action = string
priority = number
rule = list(object({
name = string
description = optional(string)
protocols = list(string)
destination_ports = list(string)
source_addresses = optional(list(string))
source_ip_groups = optional(list(string))
destination_addresses = optional(list(string))
destination_fqdns = optional(list(string))
}))
}))
| `[]` | no |
| [nat\_rule\_collection](#input\_nat\_rule\_collection) | (Optional) The NAT Rule Collection to use in this Firewall Policy Rule Collection Group. |
list(object({
name = string
action = string
priority = number
rule = list(object({
name = string
description = optional(string)
protocols = list(string)
source_addresses = optional(list(string))
source_ip_groups = optional(list(string))
destination_ports = optional(list(string))
translated_address = optional(string)
translated_port = number
translated_fqdn = optional(string)
}))
}))
| `[]` | no |

## Outputs

| Name | Description |
|------|-------------|
| [resource\_group\_id](#output\_resource\_group\_id) | resource group id |
| [resource\_group\_name](#output\_resource\_group\_name) | resource group name |
| [vnet\_names](#output\_vnet\_names) | Map of vnet names where key in input key in network map and value is name of vnet that got created. |
| [vnet\_ids](#output\_vnet\_ids) | Map of vnet names where key in input key in network map and value is id of vnet that got created. |
| [vnet\_subnets](#output\_vnet\_subnets) | Map of vnet names where key in input key in network map and value is id of the subnets that got created. |
| [vnet\_locations](#output\_vnet\_locations) | Map of vnet names where key in input key in network map and value is location of vnet that got created. |
| [vnet\_address\_spaces](#output\_vnet\_address\_spaces) | Map of vnet names where key in input key in network map and value is address of vnet that got created. |
| [vnet\_subnet\_name\_id\_map](#output\_vnet\_subnet\_name\_id\_map) | Outputs a subnet name to ID map for each Vnet |
| [firewall\_ids](#output\_firewall\_ids) | Firewall generated ids |
| [firewall\_names](#output\_firewall\_names) | Firewall names |
| [firewall\_private\_ip\_addresses](#output\_firewall\_private\_ip\_addresses) | Firewall private IPs |
| [firewall\_public\_ip\_addresses](#output\_firewall\_public\_ip\_addresses) | Firewall public IPs |
| [firewall\_subnet\_ids](#output\_firewall\_subnet\_ids) | IDs of the subnet attached to the firewall |
| [firewall\_policy\_id](#output\_firewall\_policy\_id) | The ID of the Firewall Policy. |
| [firewall\_policy\_child\_policies](#output\_firewall\_policy\_child\_policies) | The child policies of the Firewall Policy. |
| [firewall\_policy\_firewalls](#output\_firewall\_policy\_firewalls) | A list of references to Azure Firewalls that this Firewall Policy is associated with. |
| [firewall\_policy\_rule\_collection\_groups](#output\_firewall\_policy\_rule\_collection\_groups) | A list of references to Azure Firewall Rule Collection Groups that this Firewall Policy is associated with. |
| [firewall\_policy\_name](#output\_firewall\_policy\_name) | The name of the Firewall Policy. |
| [firewall\_policy\_rule\_collection\_group\_name](#output\_firewall\_policy\_rule\_collection\_group\_name) | Value of the Azure Firewall policy rule collection group name |
| [firewall\_policy\_rule\_collection\_group\_id](#output\_firewall\_policy\_rule\_collection\_group\_id) | The ID of the Firewall Policy Rule Collection Group. |