cloud-foundation-fabric/cloud-operations/dns-fine-grained-iam/README.md

5.0 KiB

Fine-grained Cloud DNS IAM via Service Directory

This example shows how to leverage Service Directory and Cloud DNS Service Directory private zones, to implement fine-grained IAM controls on DNS by

  • creating a Service Directory namespace with two services and their endpoints
  • creating a Cloud DNS private zone that uses the namespace as its authoritative source
  • creating two service accounts and assigning them the roles/servicedirectory.editor role on the namespace and on one service respectively
  • creating two VMs and setting them to use the two service accounts, so that DNS queries and gcloud commands can be used to verify the setup

The resources created in this example are shown in the high level diagram below:

A companion Medium article has been published for this example, you can refer to it for more details on the context, and the specifics of running the example.

Running the example

Clone this repository or open it in cloud shell, then go through the following steps to create resources:

  • terraform init
  • terraform apply -var project_id=my-project-id

Once done testing, you can clean up resources by running terraform destroy. To persist state, check out the backend.tf.sample file.

Testing the example

The terraform outputs generate preset gcloud compute ssh commands that you can copy and run in the console to connect to each VM. Remember to adapt the testing commands below if you changed the default values for the name, region, or zone_domain variables.

Connect via SSH to the ns VM and query the Service Directory namespace via DNS.

gcloud compute ssh dns-sd-test-ns-1 \
  --zone europe-west1-b \
  --tunnel-through-iap

dig app1.svc.example.org +short
# 127.0.0.2
# 127.0.0.3
# 127.0.0.7
dig app2.svc.example.org +short
# 127.0.0.4
# 127.0.0.5
dig _app1._tcp.app1.svc.example.org srv +short
# 10 10 80 vm1.app1.svc.example.org.
# 10 10 80 vm2.app1.svc.example.org.
# 10 10 80 vm3.app1.svc.example.org.

The DNS answers should match the ones in the comments above, after each command. Note the special format used to query SRV records.

If the above looks good, let's verify that the ns VM service account has edit rights on the namespace by creating a new service, and then verifying it via DNS.

gcloud beta service-directory services create app3 \
  --location europe-west1 \
  --namespace dns-sd-test
# Created service [app3].

gcloud beta service-directory endpoints create vm1 \
  --service app3 \
  --location europe-west1 \
  --namespace dns-sd-test \
  --address 127.0.0.6 \
  --port 80
# Created endpoint [vm1].

dig app3.svc.example.org +short
# 127.0.0.6

Log out from the ns VM and log in to the svc VM, then verify that its service account has no permissions on the whole namespace.

gcloud compute ssh dns-sd-test-svc-1 \
  --zone europe-west1-b \
  --tunnel-through-iap

gcloud beta service-directory services delete app3 \
  --location europe-west1 \
  --namespace dns-sd-test
# Deleted service [app3].
# ERROR: (gcloud.beta.service-directory.services.delete) PERMISSION_DENIED: Permission 'servicedirectory.services.delete' denied on resource 'projects/my-project/locations/europe-west1/namespaces/dns-sd-test/services/app3'.

Ignoring the deleted message which is clearly a bug (the service is still in beta after all), the error message shows that this identity has no rights to operate on the namespace. What it can do is operate on the single service we gave it access to.

gcloud beta service-directory endpoints create vm3 \
  --service app1 \
  --location europe-west1 \
  --namespace dns-sd-test \
  --address 127.0.0.7 \
  --port 80
# Created endpoint [vm3].

dig app1.svc.example.org +short
# 127.0.0.2
# 127.0.0.3
# 127.0.0.7

Variables

name description type required default
project_id Existing project id. string
name Arbitrary string used to name created resources. string dns-sd-test
region Compute region used in the example. string europe-west1
zone_domain Domain name used for the DNS zone. string svc.example.org.

Outputs

name description sensitive
gcloud_commands Commands used to SSH to the VMs.
vms VM names.