🔱 Guardian 🔱
Guardian is a Terraform collaboration and automation tool. Using the features of GitHub, Guardian enables
teams to enforce a propose, review, and acutate process for secure modification of resources.
[!IMPORTANT]
The usage of Guardian does not increase the security posture of your cloud resources if poorly configured.
This is not an official Google product.
Support
For support related items, please open a GitHub Issue.
Releases
Guardian release announcements are done via GitHub and can be found here.
You can watch the Guardian repository in order to be notified each time a release is made.
Guardian CLI
This is the underlying tool written in Golang that is enables all features. For more
details and to understand how to use the cli see Guardian CLI.
Guardian Features
[!NOTE]
While some features can be used independently, unless otherwise noted, all features have
been designed to work with GitHub products (e.g. Pull Requests, Issues, Repositories).
- Show Terraform plans and applies, including outputs, in GitHub comments on Pull Requests.
- Determines all Terraform entrypoints (e.g. where your Terraform backend configurations are)
in your repository and plan/apply for each entrypoint.
- Automatically detect changes and only plan/apply entrypoints that have changed.
- Ensures Terraform plans are always up to date via native GitHub functionality.
- Designed to work with any of your terraform configurations.
- Compatible with any version of Terraform.
- Support for administrative functionality such as one-off
state rm
or terraform apply
commands.
For more details on the user experience for an engineer developing terraform,
see Developer Workflow. For more details on the admin
experience, see Guardian Admin.
For more details on how to use the Guardian CLI for terraform actuation see the relevant
CLI doc:
You can get started with using Guardian for terraform actuation by
Creating the Terraform Actuation GitHub Workflows.
IAM Drift Detection
- Compatible with Google Cloud Platform.
- Determines if there is any drift between your real IAM for Google Cloud Platform Org, Folders,
Projects and your Terraform states.
- Generates a GitHub issue if a drift is detected.
- This issue will contain any identified click-ops changes as well as changes described
in Terraform that are missing from your actual Google Cloud Platform IAM.
For more information on using iam drift detection see the
IAM Drift CLI Docs.
You can get started with using Guardian for drift detection by
Creating the Drift Detection GitHub Workflows.
[!TIP]
Consider using in conjunction with Statefile Drift Detection
in order to locate outdated terraform state files that may incorrectly yield IAM drift.
Statefile Drift Detection
- Compatible with Google Cloud Platform.
- Determines if there are any Terraform state files stored in remote state locations
(GCS buckets) that are not represented in your Terraform repositories.
- This is especially useful when paired with IAM Drift Detection as you may encounter
leftover state files that are no longer used that contain IAM resources. These IAM resources
will falsely indicate a drift.
- Generates a GitHub issue if a drift is detected.
- This issue will contain any identified state files that are
- Described in your GitHub repositories that are missing in your remote state locations.
- In remote state locations but missing from your GitHub repositories.
- Empty (contains no resources and can be safely deleted) and not described in your GitHub repositories.
For more information on using statefile drift detection see the
Statefile Drift CLI Docs.
You can get started with using Guardian for drift detection by
Creating the Drift Detection GitHub Workflows.
- Design your Terraform to have many small Terraform entrypoints. This will result
in small Terraform state files - large Terraform states are an anti-pattern as they
take a long time to plan/apply, are difficult to refactor, and broken applies can result
in blocking all future work.
- Limit use of remote state. Remote state can be especially attractive when using many
smaller Terraform entrypoints as it permits you to share configuration across entrypoints.
However, remote state adds a lot of complexity to determining how your state should be
planned/applied (e.g. updating entrypoint state A which is used in entrypoint state B
means two separate applies - which puts the burden on the user to figure out how to
manage this operation).
- If you are going to rely on remote state, try to use state that is relatively static.
For example, a good candidate for remote state would be if you have some initial
resources that need to be setup once and rarely change (e.g. Configuring a Google Cloud Platform Org).
Developer workflow
-
Create a PR to propose Terraform changes
-
Guardian will run terraform plan
for the configured working directories and
will create a pull request comment with the plan diff for easy review
-
Guardian will store the plan file remotely in a Google Cloud Storage bucket,
with a unique prefix per pull request, per Terraform working directory:
gs://<BUCKET_NAME>/guardian-plans/<OWNER>/<REPO>/<PR_NUMBER>/<TERRAFORM_WORKING_DIRECTORY_PATH>/tfplan.binary
gs://my-terraform-state/guardian-plans/owner/repo/20/terraform/production/tfplan.binary
-
Have your PR reviewed and approved by a CODEOWNER
-
If you need to re-run your plan, push new changes or re-run the workflow to
generate new plan files
- Use
git commit --allow-empty -m "sync" && git push origin BRANCH
to push
an empty commit to re-trigger
-
When the PR is merged Guardian will automatically run terraform apply
for
the plan file created for each working directory and post the results as PR
comments
-
Regardless of success or failure of apply, Guardian will delete all plan files
- If the apply fails:
- Another PR should be submitted to fix the failed state for the environment
- A repository admin can run the Guardian Admin workflow to run Terraform
commands to fix the state, e.g. via
terraform apply
Guardian Admin
The Guardian Admin
workflow can be used to run commands manually as the
service account for Guardian. This process can only be done by someone with
Admin permissions (may require a breakglass) and is helpful in fixing error
scenarios with Terraform.
- Navigate to the Actions tab and select
Guardian Admin
- Click the
Run workflow
drop down in the top right area
- Fill out the inputs
- BRANCH: Only works from the default branch e.g.
main
- COMMAND: The Terraform command to run e.g.
apply -input=false -auto-approve
- ENTRYPOINT: A directory to find all child directories containing Terraform
configurations. If left blank, the Terraform command will run
for all configured directories.
Guardian Run
The Guardian Run
workflow can be used to run a limited set of Terraform commands manually as the service account for Guardian. This allows any user with
write permissions for the repository to run this workflow and maintain their Terraform configurations.
- Navigate to the Actions tab and select
Guardian Run
- Click the
Run workflow
drop down in the top right area
- Fill out the inputs
- BRANCH: Only works from the default branch e.g.
main
- COMMAND: Choose from the list of options you want to run.
The default command is
plan
.
- ENTRYPOINT: A directory to find all child directories containing Terraform
configurations. If left blank, the Terraform command will run for all
configured directories.
Security
Guardian recommends the use of pull_request_target
for the Guardian Plan
action. This is for two reasons:
pull_request_target
is run in the context head commit on the default branch
(usually main
), this ensures that only the approved and merged workflow is
run for any given pull request.
- This enables the ability to restrict access to the Google Cloud Workload
Identity Federation provider using the
@refs/heads/main
for the workflows,
additionally ensuring only approved and merged workflows can impersonate the
highly privileged service account. This prevents someone from copying the
workflows with the pull_request
trigger and using the service account
however they want.
Because pull_request_target
runs in the context of the head commit on the
repository default branch, we need to checkout the pull request branch for
Guardian to run terraform plan
on the proposed changes. This has been
documented as a security issue.
To make this process secure, Guardian should only be run in internal
or
private
repositories and should disable the use of forks. This makes the
pull_request_target
operate with the same default behavior as pull_request
but still ensures only the approved and merged workflow is being executed for
the pull request.
Workload Identity Federation
Terraform service accounts have elevated privileges, following WIF Best Practices
is recommended when setting up guardian to use Workload Identity Federation. Below is an example attribute
configuration that can be used to set up guardian in a secure manner.
The following attribute mappings map claims from the GitHub Actions JWT
to Google STS token attributes.
google.subject=assertion.sub
attribute.actor=assertion.actor
attribute.aud=assertion.aud
attribute.ref=assertion.ref
attribute.repository_owner_id=assertion.repository_owner_id
attribute.repository_id=assertion.repository_id
attribute.repository_visibility=assertion.repository_visibility
attribute.workflow_ref=assertion.workflow_ref
The following attribute condition verifies that the request is coming from your GitHub organization
and repository as well as restricting access to only the guardian workflows that run on the main branch.
attribute.repository_owner_id == "<your-repository-owner-id>" &&
attribute.repository_id == "<your-repository-id>" &&
attribute.repository_visibility != "public" &&
attribute.ref == "refs/heads/main" &&
attribute.workflow_ref in [
"<your-repository-owner-name>/<your-repository-name>/.github/workflows/guardian-admin.yml@refs/heads/main",
"<your-repository-owner-name>/<your-repository-name>/.github/workflows/guardian-apply.yml@refs/heads/main",
"<your-repository-owner-name>/<your-repository-name>/.github/workflows/guardian-plan.yml@refs/heads/main",
"<your-repository-owner-name>/<your-repository-name>/.github/workflows/guardian-run.yml@refs/heads/main",
]
You can find the id
and owner.id
of your repository by using GitHub's REST API.
$ OWNER_NAME="owner"
$ REPO_NAME="repo"
$ curl https://api.github.com/repos/$OWNER_NAME/$REPO_NAME | jq '. | {"id": .id, "owner": { "id": .owner.id }}'
{
"id": 12345,
"owner": {
"id": 9876
}
}
Repository Setup
General
- Ensure repository visibility is set to
internal
or private
- Ensure that
Allow forking
is disabled, Guardian recommends the use of
pull_request_target
, see above
Rulesets
Rulesets are required to enable a safe and secure process. Ensuring
these values are set properly prevents multiple pull requests from stepping on
each other. By enabling Require branches to be up to date before merging
, pull
requests merged at the same time will cause one to fail and be forced to pull
the changes from the default branch. This will kick of the planning process to
ensure the latest changes are always merged.
- Require a pull request before merging
- Required approvals: minimum 1, suggested 2
- Require review from Code Owners
- Require conversation resolution before merging
- Require status checks to pass before merging
- Require branches to be up to date before merging
- After you create your first PR, make sure you require the
plan_success
job
status check, this is required to ensure the
Require branches to be up to date before merging
is enforced.
- Require signed commits (optional)
- Require linear history
Using Private Repositories as Modules
If you want to use Terraform modules located in private GitHub repositories then you will need to
configure git with the necessary permissions in order for Guardian to access these modules.
USERNAME=user-defined-name
TOKEN=your-token-with-read-acccess
git config --global url."https://${USERNAME}:${TOKEN}@github.com".insteadOf "https://github.com"
The USERNAME
variable has no functional purpose and can be an arbitrary string. It is required
to be present in the URL, but GitHub will identify the user based on the token. It is recommended to provide a descriptive username and/or comment here so that developers know where this token came from (e.g. guardian-pat-token).
We recommend using github-token-minter to generate short-lived access tokens token on demand for this purpose in your GitHub Actions.
Directories
Guardian will only run Terraform commands for directories that have a Terraform
backend configuration.
This means if you add a new folder and you want Guardian to run the
terraform plan
and terraform apply
commands from that directory as the root
of the module, you should include a backend configuration within that directory.
To use Guardian in your repository, see the
template installation instructions
in the abc.templates
folder.
Creating Drift Detection Workflows
To use Guardian drift detection in your repository, see the
template installation instructions
in the abc.templates
folder.