Coder Social home page Coder Social logo

jmorrowomni / cool-dns-cyber.dhs.gov Goto Github PK

View Code? Open in Web Editor NEW

This project forked from cisagov/cool-dns-cyber.dhs.gov

0.0 0.0 0.0 890 KB

Terraform configuration to create and populate the cyber.dhs.gov zone.

License: Creative Commons Zero v1.0 Universal

Shell 11.61% HCL 88.39%

cool-dns-cyber.dhs.gov's Introduction

cool-dns-cyber.dhs.gov

GitHub Build Status

This repository contains a Terraform configuration that will provision the DNS zone cyber.dhs.gov within the COOL. It creates an IAM role that allows sufficient permissions to modify resources records in this zone. This role has a trust relationship with the users account.

Usage

  1. Run the command terraform init.
  2. Run the command terraform apply.

Requirements

Name Version
terraform ~> 1.0
aws ~> 4.9

Providers

Name Version
aws ~> 4.9
aws.acmresourcechange ~> 4.9
aws.dnsprovisionaccount ~> 4.9
aws.organizationsreadonly ~> 4.9
aws.route53resourcechange ~> 4.9
terraform n/a

Modules

Name Source Version
read_terraform_state github.com/cisagov/terraform-state-read-role-tf-module n/a

Resources

Name Type
aws_acm_certificate.rules resource
aws_acm_certificate_validation.rules resource
aws_iam_policy.acmresourcechange_policy resource
aws_iam_policy.route53resourcechange_policy resource
aws_iam_policy.sesmanagesuppressionlist_policy resource
aws_iam_policy.sessendemail_policy resource
aws_iam_role.acmresourcechange_role resource
aws_iam_role.route53resourcechange_role resource
aws_iam_role.sesmanagesuppressionlist_role resource
aws_iam_role.sessendemail_role resource
aws_iam_role_policy_attachment.acmresourcechange_policy_attachment resource
aws_iam_role_policy_attachment.route53resourcechange_policy_attachment resource
aws_iam_role_policy_attachment.sesmanagesuppressionlist_policy_attachment resource
aws_iam_role_policy_attachment.sessendemail_policy_attachment resource
aws_route53_record._amazonses_TXT resource
aws_route53_record._amazonses_dmarc_TXT resource
aws_route53_record._dmarc_TXT resource
aws_route53_record.api_crossfeed_prod_digicert_CAA resource
aws_route53_record.api_crossfeed_staging_digicert_CAA resource
aws_route53_record.api_ready_set_cyber_prod_A resource
aws_route53_record.api_ready_set_cyber_prod_AAAA resource
aws_route53_record.api_ready_set_cyber_prod_digicert_CAA resource
aws_route53_record.api_ready_set_cyber_staging_digicert_CAA resource
aws_route53_record.api_staging_ready_set_cyber_staging_A resource
aws_route53_record.api_staging_ready_set_cyber_staging_AAAA resource
aws_route53_record.ceil_NS resource
aws_route53_record.crossfeed_prod_A resource
aws_route53_record.crossfeed_prod_AAAA resource
aws_route53_record.crossfeed_prod_acme_TXT resource
aws_route53_record.crossfeed_prod_api_A resource
aws_route53_record.crossfeed_prod_api_AAAA resource
aws_route53_record.crossfeed_prod_api_acm_CNAME resource
aws_route53_record.crossfeed_prod_api_acme_TXT resource
aws_route53_record.crossfeed_prod_digicert_CAA resource
aws_route53_record.crossfeed_prod_dkim1_CNAME resource
aws_route53_record.crossfeed_prod_dkim2_CNAME resource
aws_route53_record.crossfeed_prod_dkim3_CNAME resource
aws_route53_record.crossfeed_prod_docs_CNAME resource
aws_route53_record.crossfeed_staging_A resource
aws_route53_record.crossfeed_staging_AAAA resource
aws_route53_record.crossfeed_staging_CNAME resource
aws_route53_record.crossfeed_staging_MX resource
aws_route53_record.crossfeed_staging_TXT resource
aws_route53_record.crossfeed_staging_acme_TXT resource
aws_route53_record.crossfeed_staging_api_A resource
aws_route53_record.crossfeed_staging_api_AAAA resource
aws_route53_record.crossfeed_staging_api_CNAME resource
aws_route53_record.crossfeed_staging_api_acme_TXT resource
aws_route53_record.crossfeed_staging_cd_A resource
aws_route53_record.crossfeed_staging_cd_AAAA resource
aws_route53_record.crossfeed_staging_cd_CNAME resource
aws_route53_record.crossfeed_staging_cd_api_A resource
aws_route53_record.crossfeed_staging_cd_api_AAAA resource
aws_route53_record.crossfeed_staging_cd_api_CNAME resource
aws_route53_record.crossfeed_staging_cd_dkim1_CNAME resource
aws_route53_record.crossfeed_staging_cd_dkim2_CNAME resource
aws_route53_record.crossfeed_staging_cd_dkim3_CNAME resource
aws_route53_record.crossfeed_staging_digicert_CAA resource
aws_route53_record.crossfeed_staging_dkim1_CNAME resource
aws_route53_record.crossfeed_staging_dkim2_CNAME resource
aws_route53_record.crossfeed_staging_dkim3_CNAME resource
aws_route53_record.dkim_CNAME resource
aws_route53_record.dkim_dmarc_CNAME resource
aws_route53_record.dmarc_MX resource
aws_route53_record.drop_ncats_A resource
aws_route53_record.fw01_ncats_A resource
aws_route53_record.fw02_ncats_A resource
aws_route53_record.mail_MX resource
aws_route53_record.mail_SPF resource
aws_route53_record.pca_production_NS resource
aws_route53_record.pca_staging_NS resource
aws_route53_record.ready_set_cyber_prod_A resource
aws_route53_record.ready_set_cyber_prod_AAAA resource
aws_route53_record.ready_set_cyber_prod_acme_TXT resource
aws_route53_record.ready_set_cyber_prod_digicert_CAA resource
aws_route53_record.ready_set_cyber_staging_digicert_CAA resource
aws_route53_record.root_A resource
aws_route53_record.root_AAAA resource
aws_route53_record.root_CAA resource
aws_route53_record.root_MX resource
aws_route53_record.root_SPF resource
aws_route53_record.root_acm_rules_CNAME resource
aws_route53_record.rsaa_dev_CNAME resource
aws_route53_record.rsaa_dev_piv_CNAME resource
aws_route53_record.rsaa_dev_piv_acme_CNAME resource
aws_route53_record.rsaa_stage_CNAME resource
aws_route53_record.rsaa_stage_piv_CNAME resource
aws_route53_record.rsaa_stage_piv_acme_CNAME resource
aws_route53_record.rules_certificate_validation resource
aws_route53_record.rules_ncats_A resource
aws_route53_record.rules_ncats_AAAA resource
aws_route53_record.staging_ready_set_cyber_prod_AAAA resource
aws_route53_record.staging_ready_set_cyber_staging_A resource
aws_route53_record.vip_ncats_A resource
aws_route53_record.vpn_ncats_CNAME resource
aws_route53_record.wildcard_report_dmarc_TXT resource
aws_route53_zone.cyber_dhs_gov resource
aws_ses_domain_dkim.cyber_dhs_gov_dkim resource
aws_ses_domain_dkim.dmarc_dkim resource
aws_ses_domain_identity.cyhy_dhs_gov_identity resource
aws_ses_domain_identity.dmarc_identity resource
aws_ses_domain_mail_from.cyber_dhs_gov resource
aws_ses_identity_notification_topic.cyber_dhs_gov_bounce resource
aws_ses_identity_notification_topic.cyber_dhs_gov_complaint resource
aws_ses_identity_notification_topic.cyber_dhs_gov_delivery resource
aws_sns_topic.cyber_dhs_gov_bounce resource
aws_sns_topic.cyber_dhs_gov_complaint resource
aws_sns_topic.cyber_dhs_gov_delivery resource
aws_sns_topic_subscription.cyber_dhs_gov_bounce resource
aws_sqs_queue.cyber_dhs_gov_delivery resource
aws_caller_identity.current data source
aws_iam_policy_document.acmresourcechange_doc data source
aws_iam_policy_document.assume_role_doc data source
aws_iam_policy_document.route53resourcechange_doc data source
aws_iam_policy_document.sesmanagesuppressionlist_assume_role_doc data source
aws_iam_policy_document.sesmanagesuppressionlist_doc data source
aws_iam_policy_document.sessendemail_assume_role_doc data source
aws_iam_policy_document.sessendemail_doc data source
aws_organizations_organization.cool data source
terraform_remote_state.dns data source
terraform_remote_state.master data source
terraform_remote_state.pca_production data source
terraform_remote_state.pca_staging data source
terraform_remote_state.terraform data source

Inputs

Name Description Type Default Required
acmresourcechange_role_description The description to associate with the IAM role (as well as the corresponding policy) that allows sufficient permissions to modify ACM (AWS Certificate Manager) resources in the DNS account. string "Allows sufficient permissions to modify ACM resources in the DNS account." no
acmresourcechange_role_name The name to assign the IAM role (as well as the corresponding policy) that allows sufficient permissions to modify ACM (AWS Certificate Manager) resources in the DNS account. string "ACMResourceChange" no
additional_remote_state_account_ids A list of account IDs corresponding to additional accounts that should have permission to assume the role to read this root module's remote state (e.g. ["123456789012"]). list(string) [] no
additional_ses_sendemail_account_ids A list of account IDs corresponding to additional accounts that should have permission to assume the role to send email via AWS SES (e.g. ["123456789012"]). list(string) [] no
api_gateway_zone_id The Route 53 hosted zone ID for API gateways. string "Z1UJRXOUMOOFQ8" no
aws_region The AWS region to communicate with. string "us-east-1" no
cyhy_account_id The ID of the CyHy account. string n/a yes
read_terraform_state_role_name The name to assign the IAM role and policy that allows read-only access to the cool-dns-cyber.dhs.gov state in the S3 bucket where Terraform state is stored. string "ReadCyberDhsGovTerraformState" no
route53resourcechange_role_description The description to associate with the IAM role (as well as the corresponding policy) that allows sufficient permissions to modify resource records in the DNS zone. string "Allows sufficient permissions to modify resource records in the DNS zone." no
route53resourcechange_role_name The name to assign the IAM role (as well as the corresponding policy) that allows sufficient permissions to modify resource records in the DNS zone. string "Route53ResourceChange-cyber.dhs.gov" no
sesmanagesuppressionlist_role_description The description to associate with the IAM role (as well as the corresponding policy) that allows sufficient permissions to manage the suppression list. string "Allows sufficient permissions to manage the suppression list." no
sesmanagesuppressionlist_role_name The name to assign the IAM role (as well as the corresponding policy) that allows sufficient permissions to manage the suppression list. string "SesManageSuppressionList-cyber.dhs.gov" no
sessendemail_role_description The description to associate with the IAM role (as well as the corresponding policy) that allows sufficient permissions to send email via AWS SES. string "Allows sufficient permissions to send email via AWS SES." no
sessendemail_role_name The name to assign the IAM role (as well as the corresponding policy) that allows sufficient permissions to send email via AWS SES. string "SesSendEmail-cyber.dhs.gov" no
tags Tags to apply to all AWS resources created. map(string) {} no

Outputs

Name Description
acmresourcechange_role IAM role that allows sufficient permissions to modify ACM (AWS Certificate Manager) resources in the DNS account.
cyber_dhs_gov_zone The cyber.dhs.gov public hosted zone.
route53resourcechange_role IAM role that allows sufficient permissions to modify resource records in the cyber.dhs.gov zone.
sesmanagesuppressionlist_role IAM role that allows sufficient permissions to manage the AWS SES suppression list.
sessendemail_role IAM role that allows sufficient permissions to send email via AWS SES.

Notes

Running pre-commit requires running terraform init in every directory that contains Terraform code. In this repository, this is just the main directory.

Contributing

We welcome contributions! Please see CONTRIBUTING.md for details.

License

This project is in the worldwide public domain.

This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the CC0 1.0 Universal public domain dedication.

All contributions to this project will be released under the CC0 dedication. By submitting a pull request, you are agreeing to comply with this waiver of copyright interest.

cool-dns-cyber.dhs.gov's People

Contributors

aloftus23 avatar arcsector avatar cablej avatar cduhn17 avatar dav3r avatar dependabot[bot] avatar epicfaace avatar felddy avatar hillaryj avatar jasonodoom avatar jmorrowomni avatar jsf9k avatar lfilip-ivaal avatar mcdonnnj avatar michaelsaki avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.