forked from cloudposse/terraform-aws-eks-node-group
-
Notifications
You must be signed in to change notification settings - Fork 0
/
security-group.tf
38 lines (32 loc) · 1.46 KB
/
security-group.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
# https://docs.aws.amazon.com/eks/latest/APIReference/API_RemoteAccessConfig.html
locals {
sg_name = format("%v%v%v", module.label.id, module.label.delimiter, "remoteAccess")
}
resource "aws_security_group" "remote_access" {
count = local.need_remote_access_sg ? 1 : 0
name = local.sg_name
description = "Allow SSH access to all nodes in the nodeGroup"
vpc_id = data.aws_eks_cluster.this[0].vpc_config[0].vpc_id
tags = merge(module.label.tags, { "Name" = local.sg_name })
}
resource "aws_security_group_rule" "remote_access_public_ssh" {
#bridgecrew:skip=BC_AWS_NETWORKING_1:Skipping `Port Security 0.0.0.0:0 to 22` check because we want to allow SSH access to all nodes in the nodeGroup
count = local.need_remote_access_sg && length(var.source_security_group_ids) == 0 ? 1 : 0
description = "Allow SSH access to nodes from anywhere"
type = "ingress"
protocol = "tcp"
from_port = 22
to_port = 22
cidr_blocks = ["0.0.0.0/0"]
security_group_id = join("", aws_security_group.remote_access.*.id)
}
resource "aws_security_group_rule" "remote_access_source_sgs_ssh" {
for_each = local.need_remote_access_sg ? toset(var.source_security_group_ids) : []
description = "Allow SSH access to nodes from security group"
type = "ingress"
protocol = "tcp"
from_port = 22
to_port = 22
security_group_id = aws_security_group.remote_access[0].id
source_security_group_id = each.value
}