Skip to content

general add vpcsourceip #26

Merged
merged 1 commit into from
Jul 13, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -118,3 +118,7 @@

* v1.13.1 -- 20210608
- add lifecycle ignore tags["boc:tf_module_version"]

* v1.13.2 -- 20210713
- general
- change ip_restriction to be a dynamic condition block to also include VpcSourceIp
2 changes: 1 addition & 1 deletion common/version.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
locals {
_module_version = "1.13.1"
_module_version = "1.13.2"
}
19 changes: 18 additions & 1 deletion iam-general-policies/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -96,6 +96,24 @@ locals {
account_environment = data.aws_arn.current.partition == "aws-us-gov" ? "gov" : "ew"

ipr_cidr_blocks = compact(concat(var.ipr_base_cidr_blocks, var.ipr_vpc_cidr_blocks, var.ipr_nat_gateway_cidr_blocks, var.ipr_additional_cidr_blocks))
ipr_conditions_list = [
{
test : "Bool"
variable : "aws:ViaAWSService"
values : ["false"]
},
{
test : "NotIpAddressIfExists"
variable : "aws:sourceIp"
values : local.ipr_cidr_blocks
},
{
test : "NotIpAddressIfExists"
variable : "aws:VpcSourceIp"
values : var.ipr_vpc_cidr_blocks
},
]
ipr_conditions = [for x in local.ipr_conditions_list : x if length(x.values) > 0]

base_tags = {
"Organization" = "census:aditcio:csvd"
Expand Down Expand Up @@ -144,4 +162,3 @@ resource "aws_iam_policy" "general" {
ignore_changes = [tags["boc:tf_module_version"]]
}
}

18 changes: 9 additions & 9 deletions iam-general-policies/policy_data.tf
Original file line number Diff line number Diff line change
Expand Up @@ -63,21 +63,21 @@ data "aws_iam_policy_document" "deny_billing" {
}
}

# generated dynamically based on passing cidr blocks
data "aws_iam_policy_document" "ip_restriction" {
statement {
sid = "IpAddressRestriction"
effect = "Deny"
actions = ["*"]
resources = ["*"]
condition {
test = "NotIpAddress"
variable = "aws:SourceIp"
values = local.ipr_cidr_blocks
}
condition {
test = "Bool"
variable = "aws:ViaAWSService"
values = ["false"]
dynamic "condition" {
for_each = local.ipr_conditions
iterator = c
content {
test = c.value.test
variable = c.value.variable
values = c.value.values
}
}
}
}
Expand Down