Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Added testit domain #117

Merged
merged 3 commits into from
May 5, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
96 changes: 0 additions & 96 deletions src/domains/blueprint-common/.terraform.lock.hcl

This file was deleted.

62 changes: 62 additions & 0 deletions src/domains/testit-common/.terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

16 changes: 16 additions & 0 deletions src/domains/testit-common/00_azuread.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
# Azure AD
data "azuread_group" "adgroup_admin" {
display_name = "${local.product}-adgroup-admin"
}

data "azuread_group" "adgroup_developers" {
display_name = "${local.product}-adgroup-developers"
}

data "azuread_group" "adgroup_externals" {
display_name = "${local.product}-adgroup-externals"
}

data "azuread_group" "adgroup_security" {
display_name = "${local.product}-adgroup-security"
}
23 changes: 23 additions & 0 deletions src/domains/testit-common/00_monitor.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
data "azurerm_resource_group" "monitor_rg" {
name = var.monitor_resource_group_name
}

data "azurerm_log_analytics_workspace" "log_analytics" {
name = var.log_analytics_workspace_name
resource_group_name = var.log_analytics_workspace_resource_group_name
}

data "azurerm_application_insights" "application_insights" {
name = local.monitor_appinsights_name
resource_group_name = data.azurerm_resource_group.monitor_rg.name
}

# data "azurerm_monitor_action_group" "slack" {
# resource_group_name = var.monitor_resource_group_name
# name = local.monitor_action_group_slack_name
# }
#
# data "azurerm_monitor_action_group" "email" {
# resource_group_name = var.monitor_resource_group_name
# name = local.monitor_action_group_email_name
# }
13 changes: 13 additions & 0 deletions src/domains/testit-common/00_network.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
data "azurerm_virtual_network" "vnet_ita" {
name = local.vnet_ita_name
resource_group_name = local.vnet_ita_resource_group_name
}

data "azurerm_resource_group" "rg_vnet_ita" {
name = local.vnet_ita_resource_group_name
}

data "azurerm_dns_zone" "public" {
name = local.dns_zone_public_name
resource_group_name = local.vnet_ita_resource_group_name
}
66 changes: 66 additions & 0 deletions src/domains/testit-common/01_keyvault_0.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,66 @@
resource "azurerm_resource_group" "sec_rg_domain" {
name = "${local.project}-sec-rg"
location = var.location

tags = var.tags
}

module "key_vault_domain" {
source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//key_vault?ref=v8.8.0"

name = "${local.project}-kv"
location = azurerm_resource_group.sec_rg_domain.location
resource_group_name = azurerm_resource_group.sec_rg_domain.name
tenant_id = data.azurerm_client_config.current.tenant_id
soft_delete_retention_days = 90
sku_name = "premium"

tags = var.tags
}

## ad group policy ##
resource "azurerm_key_vault_access_policy" "ad_admin_group_policy" {
key_vault_id = module.key_vault_domain.id

tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azuread_group.adgroup_admin.object_id

key_permissions = ["Get", "List", "Update", "Create", "Import", "Delete", "Encrypt", "Decrypt", "Backup", "Purge", "Recover", "Restore", "Sign", "UnwrapKey", "Update", "Verify", "WrapKey", "Release", "Rotate", "GetRotationPolicy", "SetRotationPolicy"]
secret_permissions = ["Get", "List", "Set", "Delete", "Backup", "Purge", "Recover", "Restore"]
storage_permissions = []
certificate_permissions = ["Get", "List", "Update", "Create", "Import", "Delete", "Restore", "Purge", "Recover", ]
}

#
# policy developers
#
resource "azurerm_key_vault_access_policy" "adgroup_developers_policy" {

key_vault_id = module.key_vault_domain.id

tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azuread_group.adgroup_developers.object_id

key_permissions = var.env_short == "d" ? ["Get", "List", "Update", "Create", "Import", "Delete", ] : ["Get", "List", "Update", "Create", "Import", ]
secret_permissions = var.env_short == "d" ? ["Get", "List", "Set", "Delete", ] : ["Get", "List", "Set", ]
storage_permissions = []
certificate_permissions = var.env_short == "d" ? ["Get", "List", "Update", "Create", "Import", "Delete", "Restore", "Purge", "Recover", "ManageContacts", ] : ["Get", "List", "Update", "Create", "Import", "Restore", "Recover", ]
}

#
# policy externals
#

resource "azurerm_key_vault_access_policy" "adgroup_externals_policy" {
count = var.env_short == "d" ? 1 : 0

key_vault_id = module.key_vault_domain.id

tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azuread_group.adgroup_externals.object_id

key_permissions = ["Get", "List", "Update", "Create", "Import", "Delete", ]
secret_permissions = ["Get", "List", "Set", "Delete", ]
storage_permissions = []
certificate_permissions = ["Get", "List", "Update", "Create", "Import", "Delete", "Restore", "Purge", "Recover", "ManageContacts", ]
}
30 changes: 30 additions & 0 deletions src/domains/testit-common/99_main.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "<= 3.101.0"
}
azuread = {
source = "hashicorp/azuread"
version = "<= 2.47.0"
}
null = {
source = "hashicorp/null"
version = "<= 3.2.1"
}
}

backend "azurerm" {}
}

provider "azurerm" {
features {
key_vault {
purge_soft_delete_on_destroy = false
}
}
}

data "azurerm_subscription" "current" {}

data "azurerm_client_config" "current" {}
Loading
Loading