Skip to content
This repository has been archived by the owner on Nov 14, 2022. It is now read-only.

Static sec-group ranges for "all internet" access use-case #30

Open
gberche-orange opened this issue Feb 22, 2017 · 0 comments
Open

Static sec-group ranges for "all internet" access use-case #30

gberche-orange opened this issue Feb 22, 2017 · 0 comments
Milestone

Comments

@gberche-orange
Copy link
Member

gberche-orange commented Feb 22, 2017

In addition to supporting dynamic ASG derived from filtered credentials, there are use-cases for creating static ASG definitions regardless of the returned credentials.

One use-case, is a static-cred-broker that will provide an "all internet" service, possibly returning empty credentials.

Scenario 1:

Given a sec-group-filter deployed with the following specific configuration:

cf set-env always-apply-sec-group-definitions ' [ { "protocol": "tcp", "destination": "10.0.11.0-10.0.11.255", "ports": "80,443", "description": "Allow http and https traffic from ZoneA" },  { "protocol": "tcp", "destination": "10.0.12.0/24", "ports": "80,443", "description": "Allow http and https traffic from ZoneB" } ] '

When a filtered broker returns the following binding response (e.g. a static-cred configured to return an empty binding response)

{ }

Then the following ASG is created and bound to the corresponding application:

[
 { "protocol": "tcp", "destination": "10.0.11.0/24", "ports": "80,443" } ,  
 { "protocol": "tcp", "destination": "10.0.12.0/24", "ports": "80,443" }
]

Optional scenario 2:

When a filtered broker returns the following binding response (e.g.

{"uri":"https://developer-tripadvisor.com/content-api/"}.

with developer-tripadvisor.com resolving to 23.21.145.5

Then the following ASG is created and bound to the corresponding application:

[
 { "protocol": "tcp", "destination": "23.21.145.5/32", "ports": "443" } ,  
 { "protocol": "tcp", "destination": "10.0.11.0/24", "ports": "80,443"  } ,  
 { "protocol": "tcp", "destination": "10.0.12.0/24", "ports": "80,443"  }
]

Rationale for scenario 2 is to simplify the implementation (previous behavior and existing specs are not affected). CF supports redundant security groups declarations.

@gberche-orange gberche-orange changed the title Static sec-groups for "all internet" access Static sec-group ranges for "all internet" access Feb 22, 2017
@gberche-orange gberche-orange changed the title Static sec-group ranges for "all internet" access Static sec-group ranges for "all internet" access use-case Feb 22, 2017
@gberche-orange gberche-orange modified the milestones: 3.0, 2.3 Feb 22, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant