Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/refeed/tirith-workshop
https://github.com/refeed/tirith-workshop
Last synced: 13 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/refeed/tirith-workshop
- Owner: refeed
- Created: 2024-07-06T07:27:21.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2024-07-08T06:46:27.000Z (5 months ago)
- Last Synced: 2024-07-08T22:16:45.303Z (4 months ago)
- Language: HCL
- Size: 734 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Tirith Workshop
July 8th 2024
Time: 1 - 2 hours
## Outline
- Introduction to Tirith
- Creating your first policy
- Use Case: Guardrailing Terraform deployment
- Use Case: Guardrailing cloud cost
- Tirith on StackGuardian platform## Expected outcome:
- Be able to understand and advocate for Tirith
- Be able to contribute to Tirith Roadmap## Introduction to Tirith
Time: 15 minutes
In this section, you will learn about:
- What Tirith is about
- Why are we doing Tirith
- Philosophy of Tirith### What is Tirith?
- Tirith scans declarative Infrastructure as Code (IaC) configurations like Terraform against policies defined using JSON.
- Tirith is a **declarative** policy engine, not imperative. So it is decoupled.
- Currently, the focus is more to be a **proactive** policy evaluator than **reactive**.
- It is a CLI-based program, but can also be used as a Python library### Why are we doing Tirith?
- Writing Policy as Code is not easy and requires a steep learning curve
- Expensive to maintain policies in IaC Logic
- (We can write very basic validations inside Terraform)
- Even with current engines there are still manual approvals needed
ending up in ticketing systems
- Hardcoded IaC, you need several code bases
- Policies are not going beyond resources configuration! Why not going
to cost or even CI/CD definitions?Imagine that in an organisation, you have a lot of IaC codebases and you want
to ensure that every **aws_lambda_function** inside the codebase has
memory set to 128 or even lower than 128. With one same Tirith policy, we can do evaluations on any IaC codebases.### Philosophy of Tirith
The name is from Minas Tirith, some kind of fort or castle in the Lord of the Rings. The idea is that Tirith is a fort that guards your infrastructure.
To run Tirith, the user has to provide two files: the input, and the
policy. Tirith will then evaluate the policy against the input, and then
it will produce a result, either Pass, Fail, or Skip.![](./image1.png)
Tirith is heavily inspired by the architecture of Terraform providers.
In which the provider provides an abstraction layer for the user so that
they don't have to understand how to get the data that we are interested
in evaluating.Internally, more or less, Tirith works like this:
![](./image2.png)
Example of a Tirith policy to make sure that:
- AWS VPC instance_tenancy is \"default\"
- EC2 instance cannot be destroyed
```json
{
"meta": {
"required_provider": "stackguardian/terraform_plan",
"version": "v1"
},
"evaluators": [
{
"id": "check_ec2_tenancy",
"provider_args": {
"operation_type": "attribute",
"terraform_resource_type": "aws_vpc",
"terraform_resource_attribute": "instance_tenancy"
},
"condition": {
"type": "Equals",
"value": "default"
}
},
{
"id": "destroy_ec2",
"provider_args": {
"operation_type": "action",
"terraform_resource_type": "aws_instance"
},
"condition": {
"type": "ContainedIn",
"value": ["destroy"]
}
}
],
"eval_expression": "check_ec2_tenancy && !destroy_ec2"
}
```1. When input and policy file goes into Tirith, Tirith will use the
provider that the user has specified inside the policy's meta
definition2. Based on that, it will go to each evaluator, ask the provider to
extract the input based on the **provider_args** key.3. The provider will return the result
4. It will then evaluated against the condition that is specified in
the evaluator and results in Pass, Fail, or Skip5. When all of the evaluators already got the result, the final result
of the evaluation will be decided by the expression inside the
**eval_expression** key## Creating your first policy: evaluating against a JSON file
Time: 20 minutes
In this section, we will take a look on how we can use Tirith to
guardrail a JSON input.You will learn about:
- Tirith CLI command to evaluate a policy against an input
- Tirith JSON provider
- Tirith error toleranceHere, we will create a simple authorization example with Tirith JSON provider.
### Preparation
Before doing this exercise, create two files, one for input.json one for
policy.json.**input.json**
```json
{
"path": "/stackguardian/wfgrps/test",
"verb": "POST",
"meta": {
"epoch": 1718860398,
"User-Agent": {
"name": "User-Agent",
"value": "PostmanRuntime/7.26.8"
}
}
}
```**policy.json**
```json
{
"meta": {
"version": "v1",
"required_provider": "stackguardian/json"
},
"evaluators": [
{
"id": "can_post",
"provider_args": {
"operation_type": "get_value",
"key_path": "verb"
},
"condition": {
"type": "Equals",
"value": "POST"
}
},
{
"id": "wfgrps_path",
"provider_args": {
"operation_type": "get_value",
"key_path": "path"
},
"condition": {
"type": "RegexMatch",
"value": "/stackguardian/wfgrps/test.*"
}
},
{
"id": "epoch_less_than_8th_july_2024",
"provider_args": {
"operation_type": "get_value",
"key_path": "meta.epoch"
},
"condition": {
"type": "LessThan",
"value": 1720415598
}
}
],
"eval_expression": "can_post && wfgrps_path && epoch_less_than_8th_july_2024"
}
```### Evaluating the policy against the input
To evaluate the policy against the input, run the following command:
```sh
tirith -input-path input.json -policy-path policy.json
```Explanation:
- **tirith**:
- This is the command to run the Tirith program, which is part of
the StackGuardian Policy Framework.- **-input-path input.json**:
- The -input-path option specifies the path to the input file.
- input.json is the file that contains the input data to be
scanned by Tirith.- **-policy-path policy.json**:
- The -policy-path option specifies the path to the policy file.
- policy.json is the file that contains the policies (rules)
defined in Tirith\'s policy as code.It should print:
```
Check: can_post
PASSED
Results:
1. PASSED: POST is equal to POSTCheck: wfgrps_path
PASSED
Results:
1. PASSED: /stackguardian/wfgrps/test matches regex pattern /stackguardian/wfgrps/test.*Check: epoch_less_than_8th_july_2024
PASSED
Results:
1. PASSED: 1718860398 is less than 1720415598Passed: 3 Failed: 0 Skipped: 0
Final expression used:
-> can_post && wfgrps_path && epoch_less_than_8th_july_2024
✔ Passed final evaluator
```### Error tolerance
What if sometimes one or more keys inside the input file are not found?
Let's try to delete the **verb** key inside the **input.json** and see
what happens when we try to run the evaluation again using the same
command above.It should fail the evaluation.
What if we, as a user, want the evaluator to "skips" itself (don't
include the result to the final evaluator) when a particular key is not
found?This is when **error tolerance** can be helpful.
A provider can raise an error and the error itself has a **severity**
value. (see Appendix). In this case the JSON provider raises an error of
severity value 2 when the `get_value` operation can't find the JSON
path inside the input.By setting the **error_tolerance** value to 2 or more inside the
**condition** key in the evaluator, it will mark the evaluator as
Skipped instead of Failed.Let's try to add a `error_tolerance` on the first evaluator and then rerun the evaluation to see what will happen.
## Use Case: Guardrailing Terraform deployment
Time: 10 minutes
In this section, we will take a look on how we can use Tirith to
guardrail a Terraform deployment to make sure that S3 is private.You will learn about:
- A little bit about terraform plan file
- `stackguardian/terraform_plan` provider (real capability of a
provider)### Terraform plan file
Before we run "terraform apply", ideally we'll run "terraform plan"
first to see what are the changes that will be made when we do
"terraform apply". So it's like "dry-run" only to see whether the
changes are aligned to what we expect or not.We can generate a terraform plan file by using the following
command:```sh
terraform plan -out plan.bin && terraform show -json plan.bin | jq > plan.json
```Explanation:
- terraform plan -out plan.bin:
- Creates an execution plan and saves it to plan.bin.- &&:
- Ensures the next command runs only if the previous command is
successful.- terraform show -json plan.bin:
- Converts the execution plan in plan.bin to JSON format.- \| jq:
- Processes and pretty-prints the JSON output.- \> plan.json:
- Redirects the output to a file named plan.json.The generated plan.json file contains information about what plan will
be executed when "terraform apply" is run. It's quite a big file.
Detailed information about what it contains can be found here:
[https://developer.hashicorp.com/terraform/internals/json-format#plan-representation](https://developer.hashicorp.com/terraform/internals/json-format#plan-representation)In Tirith's `stackguardian/terraform_plan` provider, we will use the final
plan.json file as the input.### Tirith `stackguardian/terraform_plan` provider
`stackguardian/terraform_plan` provider provides abstraction over the terraform plan JSON output file. The available operation_types and its arguments are available on the Appendix section.
Here we will create a policy to make sure that all `aws_s3_bucket` are
referenced by `aws_s3_bucket_intelligent_tiering_configuration`.**policy.json**
```json
{
"meta": {
"required_provider": "stackguardian/terraform_plan",
"version": "v1"
},
"evaluators": [
{
"id": "s3HasLifeCycleIntelligentTiering",
"description": "Make sure all aws_s3_bucket are referenced by aws_s3_bucket_intelligent_tiering_configuration",
"provider_args": {
"operation_type": "direct_references",
"terraform_resource_type": "aws_s3_bucket",
"referenced_by": "aws_s3_bucket_intelligent_tiering_configuration"
},
"condition": {
"type": "Equals",
"value": true,
"error_tolerance": 1
}
}
],
"eval_expression": "s3HasLifeCycleIntelligentTiering"
}
```Explanation:
- It uses "direct_references" operation_type which will figure out
whether all instances of resource type that's defined on
"terraform_resource_type" are referenced by the one that's defined
in "referenced_by".- In this case, we are looking whether all **aws_s3_bucket**
instances are referenced by
**aws_s3_bucket_intelligent_tiering_configuration**- The result of this operation type is boolean
**input.json: Available on the inputs directory**
Let's try to run the evaluation!
## Use Case: Guardrailing cloud cost
Time: 10 minutes
In this section, we will take a look on how we can use Tirith to guardrail cost usage by using `stackguardian/infracost` provider.
For example, we can make sure that the usage per month of `aws_redshit_cluster` does not exceed 30 USD.You will learn about:
- A little bit about the infracost json file
- Tirith Infracost provider### Infracost JSON file
Infracost is a tool that can predict cost from a Terraform
IaC codebase. This tool has an option to get the JSON output. We can then use the JSON file resulting from the
Infracost tool as an input for stackguardian/infracost provider.The structure of the JSON file can be found here:
[https://www.infracost.io/docs/features/json_output_format/](https://www.infracost.io/docs/features/json_output_format/)### `stackguardian/infracost` provider
`stackguardian/infracost` provider provides an abstraction over the
Infracost JSON output. By using this provider, we get the functionality
to extract the information about total monthly cost and total hourly
cost from the JSON output without writing a single code. More details
are available in the appendix section.Let's use the infracost provider to make sure that the usage per
month of a Terraform code base does not exceed 30 USD.Here is the policy for doing that:
```json
{
"meta": {
"required_provider": "stackguardian/infracost",
"version": "v1"
},
"evaluators": [
{
"id": "monthly_cost_below_30",
"description": "monthly_cost_below_30",
"provider_args": {
"operation_type": "total_monthly_cost",
"resource_type": [
"*"
]
},
"condition": {
"type": "LessThanEqualTo",
"value": 30
}
}
],
"eval_expression": "monthly_cost_below_30"
}
```
Explanation:
- It uses `total_monthly_cost` operation type, which has a required paarameter `resource_type` that has type list of string
- We define the `resource_type` as `["*"]`, which means it will take all of the resources inside the JSON file and sum up the cost
- After the result is obtained, it will be evaluated against the condition that is defined in the `condition` key, which is `LessThanEqualTo` 30**input.json: Available on the input directory**
Let's try to run the evaluation!
## Tirith on StackGuardian platform
Time: 10 minutes
StackGuardian Orchestration Platform supports Tirith on its workflow
engine. For instance, a user can make a policy to make sure that monthly
cost usage is lower than 100 USD, the policy then applied into a
workflow, then when the user runs that workflow, it will evaluate first
whether the policy is passing or failing, if it passes it will continue
to run the workflow, otherwise it will not run the workflow.You will learn about:
- Creating a Tirith policy with Terraform Plan provider with SG noCode interface
- Applying that policy into workflows in StackGuardian so that the policy will be evaluated before the workflow is executedIn this section, we will create a policy to make sure that a certain value is present in the tags of an AWS S3 bucket, then we will apply that policy into a workflow in StackGuardian Orchestrator.
### Creating a workflow
Let\'s create a workflow that creates EKS node group by using a
template available in the marketplace:1. Create a workflow group
2. In that workflow group, create a workflow by using Wizard -> Terraform
3. Use the `aws-s3-demo-website` template from the marketplace
4. Fill the remaining fields, connector, etc.
### Creating a Tirith policy to Guardrail aws_eks_node_group's tags
Here we will create a Tirith Policy using SG NoCode interface and then apply that policy into the workflow that we have created before.
1. Go into the **Policies** section in the Orchestrator
2. Click on **Create Policy**
3. Fill the resource name with a descriptive name
4. On the left hand side, click on the `Rules` section, then `Add New Policy Rule`
5. Fill the values like the image below
![](./image4.png)
After that, select on the `SG noCode`, and fill the values like the image below
![](./image3.png)Explanation
- We are using the "attribute" operation type, which will get the
"attribute" of the instances of resource type that's defined in
the "resource_type"
- In this case, we are getting the values of the attribute "tags"
in the "aws_s3_bucket" resource type- In the condition type, we are using Contains, which will make sure
that the result of the provider contains the value defined in the
"Condition value"
- In this case, we are making sure that the output of the provider
contains the tag "Owner" with the value "something"6. On the left hand side, select the **Meta** section
7. On the **Policy Enforcement** section, click **Choose** and then select the Workflow Group/Workflow that you want to apply the policy to
8. Save the policy### Running the workflow
In this section, we are going to run the previous workflow that we have created and see the result of the policy evaluation.
1. Go back to the previous workflow that we have created, and click on the **Run** button on the left hand side, and do **Quick Run** with the action `create`
2. After the workflow is executed, go to the **Compliance Checks** tab, and see the result of the policy evaluation
![](./image5.png)
Or you can also see it in the logs of the workflow run## Appendix
### Available Tirith Condition Types
- **ContainedIn**: Checks if the given value is contained within a
specified list or collection.- **Contains**: Checks if a specified list or collection contains the
given value.- **Equals**: Checks if the given value is equal to a specified value.
- **GreaterThanEqualTo**: Checks if the given value is greater than or
equal to a specified value.- **GreaterThan**: Checks if the given value is greater than a
specified value.- **IsEmpty**: Checks if the given value, list, or collection is
empty.- **IsNotEmpty**: Checks if the given value, list, or collection is
not empty.- **LessThanEqualTo**: Checks if the given value is less than or equal
to a specified value.- **LessThan**: Checks if the given value is less than a specified
value.- **RegexMatch**: Checks if the given value matches a specified
regular expression pattern.- **NotEquals**: Checks if the given value is not equal to a specified
value.- **NotContainedIn**: Checks if the given value is not contained
within a specified list or collection.- **NotContains**: Checks if a specified list or collection does not
contain the given value.### Available Tirith Providers and its operation types
**stackguardian/terraform_plan:**
1. **attribute**:
- **Description**: Get the value of a specific attribute of a
resource.- **Needed Args**:
- **terraform_resource_type**: The terraform resource type to
get the attribute (tools:
search_terraform_resource_types_tool).- **terraform_resource_attribute**: The attribute to get the
value (tools: search_terraform_attributes_tool).- **Error Values**:
- **1**: When a resource is not found.
- **2**: When an attribute of a resource is not found.
- **99**: Generic error for unsupported operations or invalid
inputs.2. **action**:
- **Description**: Get actions performed on a resource.
- **Needed Args**:
- **terraform_resource_type**: The terraform resource type to
get the actions (tools:
search_terraform_resource_types_tool).- **Error Values**:
- **1**: When a resource is not found.
- **99**: Generic error for unsupported operations or invalid
inputs.3. **count**:
- **Description**: Get count of a particular resource.
- **Needed Args**:
- **terraform_resource_type**: The terraform resource type to
get the count (tools:
search_terraform_resource_types_tool).- **Error Values**:
- **99**: Generic error for unsupported operations or invalid
inputs.4. **direct_dependencies**:
- **Description**: Get direct dependencies of a resource.
- **Needed Args**:
- **terraform_resource_type**: The terraform resource type to
get the direct dependencies (tools:
search_terraform_resource_types_tool).- **Error Values**:
- **99**: Generic error for unsupported operations or invalid
inputs.5. **direct_references**:
- **Description**: Get direct references to or from a resource.
- **Needed Args**:
- **terraform_resource_type**: The terraform resource type to
get the direct references (tools:
search_terraform_resource_types_tool).- **referenced_by**: The resource type that references the
specified resource type (tools:
search_terraform_resource_types_tool).- **references_to**: The resource type that the specified
resource type references (tools:
search_terraform_resource_types_tool).- **Error Values**:
- **1**: When a resource is not found.
- **99**: Generic error for unsupported operations or invalid
inputs.6. **terraform_version**:
- **Description**: Get the Terraform version from the plan.
- **Needed Args**: None.
- **Error Values**:
- **99**: Generic error for unsupported operations or invalid
inputs.7. **provider_config**:
- **Description**: Get the provider configuration from the plan.
- **Needed Args**:
- **terraform_provider_full_name**: The full name of the
Terraform provider (tools:
search_terraform_providers_tool).- **attribute**: The attribute of the provider configuration
to retrieve. Supported values: \'version_constraint\',
\'region\' (tools: search_provider_attributes_tool).- **Error Values**:
- **1**: When a resource is not found.
- **2**: When an attribute of a resource is not found.
- **99**: Generic error for unsupported operations or invalid
inputs.**stackguardian/infracost:**
1. **total_monthly_cost**:
- **Description**: Get the total monthly cost of all resources or
specific resources.- **Needed Args**:
- **resource_type**: The type of the resource to calculate the
cost for (tools: search_resource_types_tool).- **operation_type**: The type of cost operation to perform,
e.g., \'total_monthly_cost\' (tools:
search_cost_operations_tool).- **Error Values**:
- **1**: When a resource is not found.
- **99**: Generic error for unsupported operations or invalid
inputs.2. **total_hourly_cost**:
- **Description**: Get the total hourly cost of all resources or
specific resources.- **Needed Args**:
- **resource_type**: The type of the resource to calculate the
cost for (tools: search_resource_types_tool).- **operation_type**: The type of cost operation to perform,
e.g., \'total_hourly_cost\' (tools:
search_cost_operations_tool).- **Error Values**:
- **1**: When a resource is not found.
- **99**: Generic error for unsupported operations or invalid
inputs.**stackguardian/kubernetes:**
1. **attribute**:
- **Description**: Get the value of a specific attribute of a
Kubernetes resource.- **Needed Args**:
- **kubernetes_kind**: The Kubernetes resource kind to get the
attribute from (tools:
search_kubernetes_resource_kinds_tool).- **attribute_path**: The path to the attribute in the
Kubernetes resource (tools:
search_kubernetes_attributes_tool).- **Error Values**:
- **1**: When a resource is not found.
- **99**: Generic error for unsupported operations or invalid
inputs.**stackguardian/json:**
1. **get_value**:
- **Description**: Get the value from a dictionary based on the
specified key path.- **Needed Args**:
- **key_path**: The path to the key in the input dictionary,
separated by ., can also have \* (wildcard). If \* is
provided, the returned value will be a list (tools:
search_key_paths_tool).- **Error Values**:
- **2**: When the key path is not found.
- **99**: Generic error for unsupported operations or invalid
inputs.