-
Notifications
You must be signed in to change notification settings - Fork 12
Added EKS Automode Feature #76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows ALL ports. Error
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows ALL ports. Error
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows ALL ports. Error
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows ALL ports. Error
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows ALL ports. Error
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows ALL ports. Error
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows specific ports from /0. Error
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows specific ports from /0. Error
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows specific ports from /0. Error
examples/eks-auto-mode/main.tf
Outdated
source = "clouddrove/subnet/aws" | ||
version = "2.0.0" | ||
|
||
name = "${local.name}-subnets" | ||
environment = local.environment | ||
|
||
nat_gateway_enabled = true | ||
availability_zones = ["${local.region}a", "${local.region}b"] | ||
vpc_id = module.vpc.vpc_id | ||
cidr_block = module.vpc.vpc_cidr_block | ||
ipv6_cidr_block = module.vpc.ipv6_cidr_block | ||
type = "public-private" | ||
igw_id = module.vpc.igw_id | ||
|
||
extra_public_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/elb" = "1" | ||
} | ||
|
||
extra_private_tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "shared" | ||
"kubernetes.io/role/internal-elb" = "1" | ||
} | ||
|
||
public_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
public_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_inbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
|
||
private_outbound_acl_rules = [ | ||
{ | ||
rule_number = 100 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
cidr_block = "0.0.0.0/0" | ||
}, | ||
{ | ||
rule_number = 101 | ||
rule_action = "allow" | ||
from_port = 0 | ||
to_port = 0 | ||
protocol = "-1" | ||
ipv6_cidr_block = "::/0" | ||
}, | ||
] | ||
} |
Check failure
Code scanning / defsec
An ingress Network ACL rule allows specific ports from /0. Error
what
aws-auth-auto-mode.tf
to create access entry for automode.iam.tf
.main.tf
file