security-groups.tf 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. # Rather than pass in the aws security group, we just look it up. This will
  2. # probably be useful other places, as well.
  3. data "aws_security_group" "typical-host" {
  4. name = "typical-host"
  5. vpc_id = var.vpc_id
  6. }
  7. # For now, opening everything:
  8. # ajp port: 8009
  9. # http: 8080
  10. # https: 8443
  11. # mgmt-http: 9990
  12. # mgmt-https: 9993
  13. # txn-recovery-environment: 4712
  14. # txn-status-manager: 4713
  15. #
  16. # Also opening 80 and 443 for certbot
  17. resource "aws_security_group" "instance" {
  18. name = "Keycloak"
  19. description = "Keycloak Instances"
  20. vpc_id = var.vpc_id
  21. tags = merge(var.standard_tags, var.tags)
  22. }
  23. #resource "aws_security_group_rule" "instance-http-in" {
  24. # description = ""
  25. # type = "ingress"
  26. # from_port = "80"
  27. # to_port = "80"
  28. # protocol = "tcp"
  29. # cidr_blocks = [ "0.0.0.0/0" ]
  30. # security_group_id = aws_security_group.instance.id
  31. #}
  32. #
  33. #resource "aws_security_group_rule" "instance-https-in" {
  34. # description = ""
  35. # type = "ingress"
  36. # from_port = "443"
  37. # to_port = "443"
  38. # protocol = "tcp"
  39. # cidr_blocks = [ "0.0.0.0/0" ]
  40. # security_group_id = aws_security_group.instance.id
  41. #}
  42. #
  43. #resource "aws_security_group_rule" "instance-ajp-in" {
  44. # description = ""
  45. # type = "ingress"
  46. # from_port = "8009"
  47. # to_port = "8009"
  48. # protocol = "tcp"
  49. # cidr_blocks = [ "0.0.0.0/0" ]
  50. # security_group_id = aws_security_group.instance.id
  51. #}
  52. resource "aws_security_group_rule" "instance-alt-http-in-from-access" {
  53. description = "Alt HTTP from access"
  54. type = "ingress"
  55. from_port = "8080"
  56. to_port = "8080"
  57. protocol = "tcp"
  58. cidr_blocks = var.cidr_map["vpc-access"]
  59. security_group_id = aws_security_group.instance.id
  60. }
  61. resource "aws_security_group_rule" "instance-alt-http-in-from-elb" {
  62. description = "Alt HTTP from ELB"
  63. type = "ingress"
  64. from_port = "8080"
  65. to_port = "8080"
  66. protocol = "tcp"
  67. security_group_id = aws_security_group.instance.id
  68. source_security_group_id = aws_security_group.elb_external.id
  69. }
  70. resource "aws_security_group_rule" "instance-alt-https-in-from-access" {
  71. description = "Alt HTTPS from Access"
  72. type = "ingress"
  73. from_port = "8443"
  74. to_port = "8443"
  75. protocol = "tcp"
  76. cidr_blocks = var.cidr_map["vpc-access"]
  77. security_group_id = aws_security_group.instance.id
  78. }
  79. resource "aws_security_group_rule" "instance-alt-https-in-from-elb" {
  80. description = "Alt HTTPS from ELB"
  81. type = "ingress"
  82. from_port = "8443"
  83. to_port = "8443"
  84. protocol = "tcp"
  85. security_group_id = aws_security_group.instance.id
  86. source_security_group_id = aws_security_group.elb_external.id
  87. }
  88. #resource "aws_security_group_rule" "instance-mgmt-http-in" {
  89. # description = ""
  90. # type = "ingress"
  91. # from_port = "9990"
  92. # to_port = "9990"
  93. # protocol = "tcp"
  94. # cidr_blocks = [ "0.0.0.0/0" ]
  95. # security_group_id = aws_security_group.instance.id
  96. #}
  97. #
  98. #resource "aws_security_group_rule" "instance-mgmt-https-in" {
  99. # description = ""
  100. # type = "ingress"
  101. # from_port = "9993"
  102. # to_port = "9993"
  103. # protocol = "tcp"
  104. # cidr_blocks = [ "0.0.0.0/0" ]
  105. # security_group_id = aws_security_group.instance.id
  106. #}
  107. #
  108. #resource "aws_security_group_rule" "instance-txn-in" {
  109. # description = ""
  110. # type = "ingress"
  111. # from_port = "4712"
  112. # to_port = "4713"
  113. # protocol = "tcp"
  114. # cidr_blocks = [ "0.0.0.0/0" ]
  115. # security_group_id = aws_security_group.instance.id
  116. #}
  117. #
  118. ## lock down before production, but I couldn't get letsencrypt to work with the proxy
  119. #resource "aws_security_group_rule" "instance-all-out" {
  120. # description = ""
  121. # type = "egress"
  122. # from_port = "-1"
  123. # to_port = "-1"
  124. # protocol = "-1"
  125. # cidr_blocks = [ "0.0.0.0/0" ]
  126. # security_group_id = aws_security_group.instance.id
  127. #}