From 2026bb120583c0079d76d3c4d1e488d1b6b3a602 Mon Sep 17 00:00:00 2001 From: jamesmaddox-cf <98417364+jamesmaddox-cf@users.noreply.github.com> Date: Fri, 22 Sep 2023 15:46:53 -0400 Subject: [PATCH 1/3] updated codeowners and readme --- .github/CODEOWNERS | 2 +- README.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS index 4c0d97e..b053150 100644 --- a/.github/CODEOWNERS +++ b/.github/CODEOWNERS @@ -1,3 +1,3 @@ # These owners will be the default owners for everything in the repo. Unless a later match takes precedence. -* @jasonmacallister @mscribellito-cf +* @jasonmacallister @mscribellito diff --git a/README.md b/README.md index ca3b665..7ee8f82 100644 --- a/README.md +++ b/README.md @@ -9,7 +9,7 @@ FedRAMP Compliance: High (included as a part of Virtual Private Cloud) ``` module "private-service-access" { - source = "github.com/Coalfire-CF/ACE-GCP-Private-Service-Access" + source = "github.com/Coalfire-CF/terraform-gcp-private-service-access" project_id = data.terraform_remote_state.bootstrap.outputs.networking_project_id From cfd33d2a69610599cf288c82377d4259c910c30c Mon Sep 17 00:00:00 2001 From: jamesmaddox-cf <98417364+jamesmaddox-cf@users.noreply.github.com> Date: Mon, 2 Oct 2023 15:46:31 -0400 Subject: [PATCH 2/3] Updated README, added Contributing --- CONTRIBUTING.md | 72 ++++++++++++++++++++++++++++++++++++++++++++++ README.md | 5 +++- coalfire_logo.png | Bin 0 -> 8113 bytes 3 files changed, 76 insertions(+), 1 deletion(-) create mode 100644 CONTRIBUTING.md create mode 100644 coalfire_logo.png diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md new file mode 100644 index 0000000..f34172c --- /dev/null +++ b/CONTRIBUTING.md @@ -0,0 +1,72 @@ +# Contributing + +When contributing to this repository, please first discuss the change you wish to make via issue, +email, or any other method with the owners of this repository before making a change. + +Please note we have a code of conduct, please follow it in all your interactions with the project. + +## Pull Request Process + +1. Ensure any install or build dependencies are removed before the end of the layer when doing a + build. +2. Update the README.md with details of changes to the interface, this includes new environment + variables, exposed ports, useful file locations and container parameters. +3. Increase the version numbers in any examples files and the README.md to the new version that this + Pull Request would represent. The versioning scheme we use is [SemVer](http://semver.org/). +4. You may merge the Pull Request in once you have the sign-off of two other developers, or if you + do not have permission to do that, you may request the second reviewer to merge it for you. + +## Coalfire Code of Conduct + +## Our Pledge + +In the interest of fostering an open and welcoming environment, we, as contributors and project maintainers, pledge to make participation in our project and our community a harassment-free experience for everyone. + +## Our Values + +We pledge to act and interact in ways that contribute to an open, welcoming, diverse, inclusive, and healthy community. Our community reflects our company values: + +Respect: We believe in acknowledging the rights, beliefs, and perspectives of others. + +Excellence: We endeavor to adopt best practices in everything we do. + +Leadership: We encourage thought leadership and innovation. + +Integrity: We uphold the highest ethical standards in all our interactions. + +Teamwork: We believe in the power of working together to achieve our common goals. + +Enthusiasm: We approach every task with energy and eagerness. + +## Expected Behavior + +Demonstrate empathy and kindness toward other people. + +Be respectful of differing opinions, viewpoints, and experiences. + +Offer and gracefully accept constructive feedback. + +Show courtesy and respect in public and private communications. + +Avoid personal attacks directed toward other contributors. + +## Unacceptable Behavior + +Any form of discrimination and harassment is unacceptable. This includes but is not +limited to; offensive comments related to gender, sexual orientation, race, religion, disability, physical appearance, or other protected categories. + +Public or private harassment, deliberate intimidation, violence, or threats of. + +Publishing others’ private information, such as a physical or email address, without their explicit permission. + +• The use of sexualized language or imagery and unwelcome sexual attention or advances. + +• Trolling, insulting/derogatory comments, and personal or political attacks. + +## Reporting & Enforcement + +We encourage all communities to resolve issues on their own whenever possible. If you are unable to resolve the matter for any reason, or if the behavior is threatening or harassing, report it. We are dedicated to providing an environment where participants feel welcome and safe. Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at . All complaints will be reviewed and investigated promptly and fairly. Confidentiality will be maintained for the reporter of an incident. + +We will use our discretion in determining when and how we follow up with reported incidents. Consequences of violating this code may include, but are not limited to, a temporary or permanent ban from project participation, removal of contributions, and reporting the incident to employers or legal authorities as appropriate. + +This Code of Conduct is a living document and will evolve with the community. The project maintainers reserve the right to update this code as necessary. Any changes will be communicated to community members. \ No newline at end of file diff --git a/README.md b/README.md index 7ee8f82..882fad0 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,10 @@ +![Coalfire](coalfire_logo.png) + + # Google Cloud Private Service Access Terraform Module ## Description -Private server access module that allows you to reach the internal IP addresses of services using private connections. This module creates a global address resource and peers it with the network. +Private server access module that allows you to reach the internal IP addresses of services using private connections. This module creates a global address resource and peers it with the network. Coalfire has tested this module with Terraform version 1.5.0 and the Hashicorp Google provider versions 4.70 - 5.0. FedRAMP Compliance: High (included as a part of Virtual Private Cloud) diff --git a/coalfire_logo.png b/coalfire_logo.png new file mode 100644 index 0000000000000000000000000000000000000000..1f0c5e4b38453356be7ee43527fede4da3223f43 GIT binary patch literal 8113 zcmXwebwJbK_xAu10bx>3r4&Yqgh(ija8fuCZWDm$dAP@yiNlps{y1@wicE5EK_^ZzLyd3x< zbx?vkgFw8j*B=6pTq!pYi1`CdPUf}8G747&j{-7^X+gWUc%Dyr0$g~0viX-S#jTB3|RLJMDylbN?9L{ogpSQ{T==? z5dy-1L@F0h$vm+iXFi+d9>PCe$x7iuCPaexdSr%TKS5m(H!?#312vk#P z7crTzw$CIDk_{qp$PY*Y1XxxBv?}j@XPhpwlhqG#Y7Tki%>W3blkT`kbHS&-B;=gk z|Gg2YzZ1v?xt>e;eY`$+vM_&z0G6OVpU_ zEwEwzkWjOKuX&I87ig~SM?(%tE;=rHo}9CmG4>)}Fb=wPJFyR0PoZj78E3+h&yioU zkzlu>Vx_%J0Cblgcp|uJOry}}XLT6s!Xgqw{!(s8DyfKvgKuZu$(6psD$w(xuJe0S zjGf+unNI4swfiv+;)Z$y{rr?k^y_IblXsazMlED7>zAfKzbV*B{0WiWa`!o-X4uKj zqYoo(XZ~KT0?`Vl#mkq+$hDp=v)GC1mC+#HzpnHs`<{8WQQYXBeTH`rD~u5)p>~>k zVq(eNP)`veJRjXl(Wb`s*>JA**<^w$EV@|QJR)%JWfd)7hhXPF>07$q33FcaK`7MN zVgsK9IIN`DB10W?2ts^e@hNJwn@3iMb+DULwcM7g#C{RktTa8JqF0;&4=GK~z$Wfv z$pfgJC87a>-Oh9d+4jdQ4aLs^4XF5*p zae<3Ks+>fit!qF1=p)m{iC=zbMjG&kk68x3KxQu6`!Z zz}fdvgh7;vBn)^b>-gOVHgzrw<{WMvk7B@J^Z~il74rlCd2j#CYB00k!A7he0#}-j z7nwORs^5E-(Y?qP4V?}<4fYyjBL}WO{4`j@E^Sy-!AMOV)f8PcLp<2{^Ru$W#H-jw zz%$IhXKze0rCg4O@BNzk|H%3Y$O zQ`ddh9K=|{0|Gt#!(i4&e*Q=#Q3IbDY$ozGZn2>JnHu&>PNBuNk>45L#j=s_#eO3i zwL4G^87@t`kn^_xUFv_{D`!6&&gkO-)ve8v=sPkyV0!Fyz*NB>86Lv$CalypeXv-5 z$fT4I6mYKwXUF^Wx9mKWQuJ+C6UXB}THz`0VpVkQokP24>ogDkMB*L1m(H%{dMec| z3MR{PqYqMy{EX0bhpass+w&SFcCyb3DcM)>64-=7`k3~o-HBRGmfNkOa8BR=ftYSh z4Z(6f^T{S8tEENQQJ=5Mhk_wPXWr&7;ris=ZJ7REYi4}PHtJ_@^zR>1$H#wLPvuI8 z&FwX}C-Cyao0MLP?fT)b$!cg>Hto2EjPC>kvG$v3RE3>TTL3m9e$AL5M5&9>;rnEQ zT;OloNcxcj$LvYOzF{(^U(X@~zwQ6e-+G&y*|6w{Kc(R7>0N3X#3zw z&jO2%A3y}5D|TZpC-kQgpg58frn+sR)v^W(wdF!xRIriH5I^YbZe5)d=F#%WbVVw^>Ip=-o`7EuHtG{`4G zz^u3J`Co{|lLxF~Gb&_I7956??nCP$6T&`!@WO)e(Y@>`2qwL`tm*-YsNMS6qAfYV zG{ra3gJmokaMMLW`9DM&H{HjHr7in3`!0(*d48ph>01GPqUfF|)*SBDe{FD(A>rFe zQAUS1;Iul$H2wQwmKDNrg^>Q5Fj?(2+Q%r!0SQ$|S7b1SD-wV1xzSz5vo=wuDe-L> zyUMgu!wmx>LJ^ym;u7a%G6e4HxZxEzYZ3r@BJu|;o!>XG+LCHDO-Oa{qPzIrg85A+ z{Nxf{g2WF0(wIbyiwGW!sv@LJG?4yrnaR6WgD8%j%@`BreP5Pk?n~-&prKe!PQFaVX02({eV*Li-oXg=tzZ? z!My_#Ry_`X#mdrHsfPy33e8_!3#WGUBMPVPV3Knh9kWF%Hf}#$-%Atv4g$q}>(TuA zxh-1j!I(h0Jg-6GTECW;dl84z1chpYcgjH+V`uTNdP})~9Y4N#d;(d6 z7C*fc9_uxkyc1#65Xq9)4Ej-S5t& zQ#%~oM*WwVZM?nz_R9YLkb8w!%Fz;D;@hbquOku3P>C4HQ)aZ~XL|yWG;9K!U7|aC zuaWc*ZAY3)Fr_d^?St*5;G9D;h6Z>5tRU=UG*dHFA%9c=RdUxKrwimw?F7e4Vhx=AlV1Wtu;X<%loe#hgjT; zoB_Y(tgS(qi2(`O7K+wI>1kJ%VH_#SHLtF5HJRqcZDEf^1y|0s^6L{ZHaecF`|Xra zs-bh3(;H9SuZ}U?rz2oL9rQ(~?m@neWUsNijf$5&a7TGZW%|^Hdy`}5S5MygJOJz{ zWx7mNfa85?_&Euq)`MfoiUvP<(Pl*k%BT_B)y@&y@xOCy>d@(nYVfS&>6W^Vxz}7} zwBeZ4#j&-&_P?>AJ}dQ-8QG4Q3c&@x1P(~4GvJV#=M6ObW56L0ai&bwJzKIfKD?{O zYmG4QFwOd%z@QhpweLACIf4^Yl_qCbnRJEgG3BiFS9=(4sqs~&5GUU#@U!tPAy_mf z693H$+-^RGs@pWw(>?bUYj&jD%?F&xi`9)Fp|kx}h+q)$?PT(fEi8Cx3uiGvxF@Y; zo9&HNUMCf)$FxRnm2<3>=pVMBY&%E1S2ee@$`%Yu+3Q6Q%43baZ;cazG@RtS?va!@ zKV8*OKlTYpg|?djQ5HxQQ|_a1Svg|#(~Az--r~s^avPUuZ{WXh{lI?M&23A?!RxJ= zsN7#r+ZEHL>#WXw2b;7QJ#hhoW7!j(K8hx5u2-UZ8-p#LKW#?+(v<3J2P6)GqiWu@ z@2=pq`ulUHHCaF5mU}@&cF8eZV)N70;H#VHWEha!&*6iz_YD825)`P?g0t;^dHOqM=+{RD$KhR;MCkIr@z(M zgaFIU&ykQ^%cXJeY^k;tFmjAx_6qdR^KgaMpqh?8D&D5`qmFUUt{Zy}$~WL1jrZvk zRhg-*%|B)wP+rs_>yr_rkf!?GE!%@uU4A1PZiK4f(qao_@zx2j#p>?H*@6CHIO)jm z6|wmg2z%3bRwci@;n!w&Lj&}_81jr% zp+OA-L0zF?DO8*{f+#@=aKLV;YdcZO!_51%Xy4@;*9E}2mRzBoDur9L{PvbN7{%RK z15o8H8YxeiXOj1pV>W>f3lHZ4THvblc1*Td5Kfb6($p|F`*`!2yJZF`NSaFm$nPHz zkkG0=nC4bGX#e4f_`&Ay|J^JEDV!wcNJO}IDNuWu#0We3AStiC*Y^jQ@q|Byc9L2Z z*ENsmlhtxu$M%L#iMXXqhZ0X!7F_mt7PlJpw@t*Vw9YQDro$1Wo;tQ%Q!J~%NJCpA zt(1)~*znbdPK|(>4ajT|`$b-sy)EN`^`V;lA47cZ(H%sN8=NNO7)Xx3J+n9XSNKAz z2R{zrkr>8OM*)FRR1-M+GP9L~66Yg0$y`(h0d;?@AFh0Zd&cPKpjL+{CdO zAU+;bwMgtY|D#11Za3NYfZ5FEeb7biBJm|$X2wFhL>RdIx0H&9(=(4M3A#)t8(EZ( z#rH$yXMjY}Gm!c2`wzCB9sM;a0kXTD9`|h~sIQYA8%2bjUW`(LmhoDVvKHC;T zmev6Az-5=3VUN&%x*j49X@8sa2~(@m1OWx)_GhsPCybmVBsG4D&FCjTzq=;gv3EmN z3oz80yKlFf$o3f#uKT1E}_(t zV-JXopmFj~2ZfOJq_TzC-pf!z67LuQH z_gGeqdHB>3l&AO4SxWMxJ}TF<>b|m=5oVJp_X0Z`$gU9kwc~}wwS^CEszImAFW_Wu z(_GdO145eJzzO7|Kd8s|3iO5SF{Kc~^%{4sHfe97dEB_E^~9Hc#+43 za{#OGTG*AIa_Ll5r0ZSV$fT)OTx=6L2!yzcIh*VF%SC(5RMk|- z5?&i#Nfj8PZ-`RV^q&LX>*t+wY$8`Xv3%_XVB_eizsB@HCK7o{#D@nfysCMm>r>ET z2i)ZRhq0`|&QY@@;)E7F9S7`zd%U}igm=kA7(-`u-2`=Dh`3SHwGx%QGHvh@xBFX{g^I|@Wr+Y^WD=K zh45L!YAyjL5U8Wo!_`#8I0Nca5Mnr|m=Hrr+lv<>8mrP8XP(6I^AVlaq@9;OmQ?&B z`;>PX$XgwBCx*Q{2E%f^b!r0xT9?N1>O^1o+rw)3aQ#4d75Oldp7YD{E5-N3%sd?< z$Dq{5(+y?~z=c8JtKH=1$*yUvI7EF%}`%?PY*){q<4Bt7Iagm&$|lPNBPo zrf9JdWIkWNEUSGm-5QNrtmzc*IQy-d<@?lHiU8CxcI5TFMH|rI=PIw@*?jJ4F^siS z7mtFDr{7F7KuE^erB6HD2e#Evrg$O4IcBm~_Atd4dW~a;EdyU1!CV_2ZkNa6l7+U{ zxj~@smOc--(pXlXR7&%XKMn#SLIUL2)q3y_->Pv8(o=32aLdX$+3(ApAH*_0G=Gt3 zN3))4%>}l0-4`jy2H^C%QepM@K6HABLVI%NZH(L4)$7^c2QoS-FJcO(G_vhlBm1`N z7a(x)C(2apVoXug;_@8>gdpjX-%}~1=qa|zk0#}dJFescsgu~}ak$RuJ3e;KXQSH4*~G4gW~1XC~9@y^?lu6Av)urHObZWpP^^~^XRNIRT)mG0bzf#wPoi z7qQ4>$gyTjFGoQZk@U}(DMf5ZuKG=4zi0N-1YM$Fv<<@GPBwhGI-#>a*5xr*6-z$E zpCfL#BIOgGsLV|LS_BXirVKy2N7?&e{BXp-_u*FOW<<~JMVqumlWvPRN;l0fMWpAf zEGir{1%Z*N((2^d>DJ{ZKSmbD&>lb0d!r<$lN0JWm9KCv#-duk$5%bz8(h>3Lv7JRg9TSy9T?~+J7S9AHjzuzv z6s)87dfnI2|CWvnn%-ZsBbWf~eGZWI(K%v+HC5(ug>HUYfxamLj6Fjz{9s6d2L82K z7P%F$Vt;9Cbd2OnY;^v8^3q^13UWMSl?vg7&&{XP`8N01Dtigry#|c(T_?Qh(d%71 z_DTCwINS@;RN2)?BTZ0(u9*a!|NrxjGu2SmFUee!rYfC>T7>u zsw3Znp`Qy$)#5Y;gV|<~G%)x4`EMOHIY)mYt*o(mye`u_|1otMC7ecgg`_Fjd|C0} zQ#abhN<(-R1Tx6=pi)nN!P>m|1nF4P>I+GRL{tI263S{*;x)|uzulYL{#`Ce7t%U z+N}Mpm>482SxxPS>H4F@=*G6pf3tM_?S4i1em&$k{UVjm(C^Y+5mBQPYZprK#rm{p zNNzx)B0v_-{&luvwNfv3-vgURS($glZ})l(6KT~&d79>lp22Vfq$Z}4k6H4#an^|A ztq{bl*GXy7*G3&J2(bTtuOhZ`cV3GL|05dQFSwn|gQRch!{J{Pb&kCBvE;2v9_$nd zKP6JPL&|GbGO6LVG!h>(`T?L2;FG*hZ5Vt11D8F8Gr?xBZ!ZZvS^gcjfL<%U`ll#$ zp|zRlcZBxPPaIq!{tcwQk7L>1v5dexd~F>C2|(Yvnp!mm{m9fuDh?NO5Ud zFq>6};{$AqJ+3g0LN5E)dc5oNmd%GNtgvc<*(?Cn9RaA0PRya=7Q?2}gP-v2X1uT* zP^S=Hxw!c|TSV<@`q#F2-PA>?(beeoWizuQJej_NVShnQ31L0VyDkBk;O3E!N@ry> z+&s|pc?`~A_Xv0&KgwUoOatVWtM)%Ah3<+&%h!$1+niS_yp+)CpX0MDL0}$aljhxN z*eI@o>I)1nF|HLJ1(0)xD3McuR`K88_OHL>`#o{dT6;BvzEpR~{mvRuzz%1sv@t@# zqD2OIfrU#oxT*&B2{Zn24Gs?+r0M+RF*b71E>AJY%9+8VYPt*FdfoNu(DUxGEPGU? z!*uL3_r7XCf->GahMX;n7v6T$nwjL4<1gdO4H=P0=6~5QY|Z+=45oGvi?JXxM=rh^x|=lLWVZmI z3P`zcd6N;zMk|rxtv+HC<-xh;%uVh@B3VfYUB2jKq>l+VIRzc|*g@ zXs^fZ>@rNpnmrpgO8aZ3w$Iyel5v(vv}=pa6J8RyGnz2B$)HRIP&urU@ax`6QJF;4 zl|Q0+%xd=^*>X5Fe+gBmxfTq{_7mj8rDHHT>9!QD|YkRb=i;$p>yD}uER@l5zo?GAK8$*D?>^oy1eFim| z0PNkeO(y^YfwYVhViP((b=|-0`3=T0{!x?4+Ml5JlTkr&+A=pKijJ Zu815kb{!mO?8EC}FnKk(l9$Fo{|8sjzXt#S literal 0 HcmV?d00001 From 50240c52c9ebc5f701557a81b30c700d671f4c5a Mon Sep 17 00:00:00 2001 From: Michael Scribellito Date: Tue, 3 Oct 2023 10:35:52 -0400 Subject: [PATCH 3/3] Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 882fad0..8304047 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,7 @@ # Google Cloud Private Service Access Terraform Module ## Description -Private server access module that allows you to reach the internal IP addresses of services using private connections. This module creates a global address resource and peers it with the network. Coalfire has tested this module with Terraform version 1.5.0 and the Hashicorp Google provider versions 4.70 - 5.0. +Private service access module that allows you to reach the internal IP addresses of services using private connections. This module creates a global address resource and peers it with the network. Coalfire has tested this module with Terraform version 1.5.0 and the Hashicorp Google provider versions 4.70 - 5.0. FedRAMP Compliance: High (included as a part of Virtual Private Cloud) @@ -62,4 +62,4 @@ No modules. |------|-------------| | [address](#output\_address) | First IP of the reserved range. | | [google\_compute\_global\_address\_name](#output\_google\_compute\_global\_address\_name) | URL of the reserved range. | - \ No newline at end of file +