Skip to content

Commit

Permalink
Merge pull request #72 from vmware-samples/release/v1.6.0
Browse files Browse the repository at this point in the history
Release/v1.6.0
  • Loading branch information
vikramsinghvirdi committed Apr 14, 2021
2 parents f754338 + 06b282b commit d9c0834
Show file tree
Hide file tree
Showing 59 changed files with 4,066 additions and 41 deletions.
98 changes: 58 additions & 40 deletions README.md

Large diffs are not rendered by default.

@@ -0,0 +1,70 @@
# Set Expiry date for Azure Keyvault Key

This job sets an expiry date which will be 2 years from current date and time for the Azure Keyvault Key.

### Applicable Rule

##### Rule ID:
5c8c26677a550e1fb6560c6e

##### Rule Name:
An encryption key has no scheduled expiration

## Getting Started
### Prerequisites
The provided Azure service principal must have the following permissions:
`Microsoft.Authorization/roleAssignments/write`,
`Microsoft.Authorization/roleAssignments/read`,
`Microsoft.KeyVault/vaults/read`,
`Microsoft.KeyVault/vaults/write`,
`Microsoft.KeyVault/vaults/keys/read`,
`Microsoft.KeyVault/vaults/keys/write`,
`Microsoft.KeyVault/vaults/accessPolicies/write`,
`Microsoft.KeyVault/vaults/keys/update/action`

A sample role with requisite permissions can be found [here](minimum_permissions.json)

More information about already builtin roles and permissions can be found [here](https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles)

### Running the script
You may run this script using following commands:

```shell script
pip install -r requirements.txt
python3 azure_key_vault_expiry_date_set_for_all_keys.py
```
## Running the tests
You may run test using following command under vss-remediation-worker-job-code-python directory:

```shell script
pip install -r requirements-dev.txt
python3 -m pytest test
```
## Deployment
Provision an instance by creating an Azure Virtual Machine to use for the worker. The minimum required specifications are 128 MB memory and 1/2 Core CPU.
Setup Docker on newly provisioned Azure Virtual Machine instance.You can refer to the [docs here](https://docs.microsoft.com/en-us/previous-versions/azure/virtual-machines/linux/docker-machine) for more information.
Deploy the worker docker image by SSH into the Azure Virtual Machine instance and run the following commands:
```shell script
docker run --rm -it --name {worker_name}\
-e VSS_CLIENT_ID={ENTER CLIENT ID}\
-e VSS_CLIENT_SECRET={ENTER CLIENT SECRET}\
-e AZURE_CLIENT_ID={ENTER AZURE_CLIENT_ID} \
-e AZURE_CLIENT_SECRET={ENTER AZURE_CLIENT_SECRET} \
-e AZURE_TENANT_ID={ENTER AZURE_TENANT_ID} \
vmware/vss-remediation-worker:latest-python
```
## Contributing
The Secure State team welcomes contributions from the community. If you wish to contribute code and you have not signed our contributor license agreement (CLA), our bot will update the issue when you open a Pull Request. For any questions about the CLA process, please refer to our [FAQ](https://cla.vmware.com/faq).

All contributions to this repository must be signed as described on that page. Your signature certifies that you wrote the patch or have the right to pass it on as an open-source patch.

For more detailed information, refer to [CONTRIBUTING.md](../../../CONTRIBUTING.md).
## Versioning
We use SemVer for versioning. For the versions available, see the tags on this repository.

## Authors
* **VMware Secure State** - *Initial work*
See also the list of [contributors](https://github.com/vmware-samples/secure-state-remediation-jobs/graphs/contributors) who participated in this project.

## License
This project is licensed under the Apache License - see the [LICENSE](https://github.com/vmware-samples/secure-state-remediation-jobs/blob/master/LICENSE.txt) file for details
Empty file.

0 comments on commit d9c0834

Please sign in to comment.