Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Core key vault firewall should not be set to "Allow public access from all networks" #4251

Closed
wants to merge 1 commit into from

Conversation

jonnyry
Copy link
Collaborator

@jonnyry jonnyry commented Jan 6, 2025

Resolves #4250

@jonnyry jonnyry marked this pull request as draft January 6, 2025 11:45
Copy link

github-actions bot commented Jan 6, 2025

Unit Test Results

0 tests   0 ✅  0s ⏱️
0 suites  0 💤
0 files    0 ❌

Results for commit 6acf7f6.

♻️ This comment has been updated with latest results.

@jonnyry jonnyry force-pushed the jr/93-close-keyvault-firewall branch from 27b801d to 6acf7f6 Compare January 6, 2025 11:46
@jonnyry
Copy link
Collaborator Author

jonnyry commented Jan 6, 2025

/help

Copy link

github-actions bot commented Jan 6, 2025

🤖 pr-bot 🤖

Hello!

You can use the following commands:
    /test - build, deploy and run smoke tests on a PR
    /test-extended - build, deploy and run smoke & extended tests on a PR
    /test-extended-aad - build, deploy and run smoke & extended AAD tests on a PR
    /test-shared-services - test the deployment of shared services on a PR build
    /test-force-approve - force approval of the PR tests (i.e. skip the deployment checks)
    /test-destroy-env - delete the validation environment for a PR (e.g. to enable testing a deployment from a clean start after previous tests)
    /help - show this help

(in response to this comment from @jonnyry)

@jonnyry
Copy link
Collaborator Author

jonnyry commented Jan 6, 2025

/test 6acf7f6

Copy link

github-actions bot commented Jan 6, 2025

🤖 pr-bot 🤖

🏃 Running tests: https://github.com/microsoft/AzureTRE/actions/runs/12632129362 (with refid cfa1d17f)

(in response to this comment from @jonnyry)

@tamirkamara
Copy link
Collaborator

@jonnyry How will a CI agent connect to the FW if this is set?

@marrobi
Copy link
Member

marrobi commented Jan 6, 2025

@jonnyry believe I remember you saying you a have a script that opens/closes the KV firewall when you do a deploy? Think that would need to be part of this and added to the workflows.

@jonnyry
Copy link
Collaborator Author

jonnyry commented Jan 6, 2025

@tamirkamara @marrobi Ah right, yes, I was too hasty with my PR... the key vault secrets are read/written using the data plane.

I'll take another look.

@jonnyry
Copy link
Collaborator Author

jonnyry commented Jan 6, 2025

Closing this PR. Will open a new one once a solution in place for CI agent access.

@jonnyry jonnyry closed this Jan 6, 2025
@jonnyry jonnyry deleted the jr/93-close-keyvault-firewall branch January 6, 2025 12:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Core key vault firewall should not be set to "Allow public access from all networks"
3 participants