Skip to content

Commit 1bd1a05

Browse files
authored
feat: init functional release (#15)
feat: init functional release
1 parent b57fe71 commit 1bd1a05

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+2438
-402
lines changed

.github/settings.yml

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,9 @@ repository:
1414

1515
# By changing this field, you rename the repository.
1616

17-
# Uncomment this name property and set the name to the current repo name.
18-
# name: ""
17+
name: "terraform-ibm-base-ocp-vpc"
1918

2019
# The description is displayed under the repository name on the
2120
# organization page and in the 'About' section of the repository.
2221

23-
# Uncomment this description property
24-
# and update the description to the current repo description.
25-
# description: ""
22+
description: "Provision an IBM Cloud Red Hat OpenShift cluster on VPC Gen2"

.github/workflows/ci.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,3 +15,6 @@ jobs:
1515
call-terraform-ci-pipeline:
1616
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected]
1717
secrets: inherit
18+
with:
19+
craTarget: "examples/standard"
20+
craGoalIgnoreFile: "cra-tf-validate-ignore-goals.json"

.gitignore

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ crash.log
1616
#
1717
*.tfvars
1818

19+
.history/*
20+
1921
# Ignore files for local testing
2022
test.tf
2123

@@ -37,7 +39,7 @@ override.tf.json
3739
.terraformrc
3840
terraform.rc
3941

40-
# Ignore .tfsec
42+
# Ignore tfsec
4143
.tfsec/
4244

4345
# Ignore brew lock
@@ -52,5 +54,5 @@ Brewfile.lock.json
5254
# Node modules
5355
/node_modules
5456

55-
# Visual Studio Code
57+
# VS Code State
5658
.vscode/

.secrets.baseline

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@
2828
"name": "CloudantDetector"
2929
},
3030
{
31-
"ghe_instance": "github.ibm.com",
31+
"ghe_instance": "github.com",
3232
"name": "GheDetector"
3333
},
3434
{

README.md

Lines changed: 146 additions & 119 deletions
Large diffs are not rendered by default.

cra-tf-validate-ignore-goals.json

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
{
2+
"scc_goals": [
3+
{
4+
"scc_goal_id": "3000408",
5+
"description": "Check whether Flow Logs for VPC are enabled",
6+
"ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3645",
7+
"is_valid": true
8+
},
9+
{
10+
"scc_goal_id": "3000902",
11+
"description:": "Check whether OpenShift clusters are accessible only by using private endpoints",
12+
"ignore_reason": "This is a valid issue - tracking in https://github.ibm.com/GoldenEye/issues/issues/174",
13+
"is_valid": true
14+
},
15+
{
16+
"scc_goal_id": "3000258",
17+
"description": "Check whether Cloud Object Storage has at least # users with the IAM manager role",
18+
"ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905",
19+
"is_valid": true
20+
},
21+
{
22+
"scc_goal_id": "3000259",
23+
"description:": "Check whether Cloud Object Storage has at least # service IDs with the IAM manager role",
24+
"ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905",
25+
"is_valid": true
26+
},
27+
{
28+
"scc_goal_id": "3000266",
29+
"description": "Check whether Key Protect has at least # users with the IAM manager role",
30+
"ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905",
31+
"is_valid": true
32+
},
33+
{
34+
"scc_goal_id": "3000267",
35+
"description:": "Check whether Key Protect has at least # service IDs with the IAM manager role",
36+
"ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905",
37+
"is_valid": true
38+
},
39+
{
40+
"scc_goal_id": "3000402",
41+
"description": "Check whether Cloud Internet Services (CIS) has DDoS protection enabled",
42+
"ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905",
43+
"is_valid": true
44+
},
45+
{
46+
"scc_goal_id": "3000418",
47+
"description:": "Check whether account has at least one VPN or Direct Link configured",
48+
"ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905",
49+
"is_valid": true
50+
},
51+
{
52+
"scc_goal_id": "3000441",
53+
"description": "Check whether Virtual Private Cloud (VPC) network access control lists don't allow ingress from 0.0.0.0/0 to port 22",
54+
"ignore_reason": "This is a false alert. The way the subnets are arranged in the VPC ensures proper workload isolation. And it's not a violation of any NIST, SOC or other control. On the contrary, FedRAMP makes it clear that SG or ACLs are currently not seen as a security boundary, only subnets (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf)",
55+
"is_valid": false
56+
},
57+
{
58+
"scc_goal_id": "3000442",
59+
"description:": "Check whether Virtual Private Cloud (VPC) network access control lists don't allow ingress from 0.0.0.0/0 to port 3389",
60+
"ignore_reason": "This is a false alert. The way the subnets are arranged in the VPC ensures proper workload isolation. And it's not a violation of any NIST, SOC or other control. On the contrary, FedRAMP makes it clear that SG or ACLs are currently not seen as a security boundary, only subnets (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf)",
61+
"is_valid": false
62+
},
63+
{
64+
"scc_goal_id": "3000451",
65+
"description": "Check whether Virtual Private Cloud (VPC) network access control lists don't allow ingress from 0.0.0.0/0 to any port",
66+
"ignore_reason": "This is a false alert. The way the subnets are arranged in the VPC ensures proper workload isolation. And it's not a violation of any NIST, SOC or other control. On the contrary, FedRAMP makes it clear that SG or ACLs are currently not seen as a security boundary, only subnets (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf)",
67+
"is_valid": false
68+
},
69+
{
70+
"scc_goal_id": "3000452",
71+
"description:": "Check whether Virtual Private Cloud (VPC) network access control lists don't allow egress from 0.0.0.0/0 to any port",
72+
"ignore_reason": "This is a false alert. The way the subnets are arranged in the VPC ensures proper workload isolation. And it's not a violation of any NIST, SOC or other control. On the contrary, FedRAMP makes it clear that SG or ACLs are currently not seen as a security boundary, only subnets (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf)",
73+
"is_valid": false
74+
},
75+
{
76+
"scc_goal_id": "3000907",
77+
"description:": "Check whether OpenShift version is up-to-date",
78+
"ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/4000",
79+
"is_valid": true
80+
}
81+
]
82+
}

examples/default/README.md

Lines changed: 0 additions & 8 deletions
This file was deleted.

examples/default/main.tf

Lines changed: 0 additions & 20 deletions
This file was deleted.

examples/default/outputs.tf

Lines changed: 0 additions & 18 deletions
This file was deleted.

examples/default/provider.tf

Lines changed: 0 additions & 4 deletions
This file was deleted.

0 commit comments

Comments
 (0)