Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added EIP association and sleep. #5

Open
wants to merge 309 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
309 commits
Select commit Hold shift + click to select a range
a2f9468
migrate openvpn provisioning into ansible
Mar 14, 2019
a6418f3
fix apt lock
Mar 14, 2019
52c694a
attempt dependency on aws_internet_gateway.
Mar 15, 2019
fba5864
add igw gateway dependency to openvpn
Mar 15, 2019
5cb1d5e
needed to pass the remote subnet cidr with tf.
Mar 24, 2019
c1ce874
unknown why vars must be passed from commandline
Mar 25, 2019
4efe39b
use list of subnets
Mar 25, 2019
673d711
update vpn for dynamic cidr ranges
Apr 2, 2019
1c3b054
test change
Apr 2, 2019
b7b604f
start and stop vpn service with sleep
queglay Apr 4, 2019
3915bd7
added routes to be configured on vpn install
queglay May 20, 2019
8bde7be
TF_VAR_onsite_workstation_ssh_key
queglay May 27, 2019
4bc02bd
upgrade command
queglay Aug 17, 2019
463a934
fix element pull index 0
queglay Aug 17, 2019
ebdea42
disable local workstation routes add open vpn to hosts
queglay Aug 18, 2019
18b6a83
update dynamic inventory
queglay Aug 18, 2019
e5ae853
add bastion ip for private route to vpn server
queglay Aug 20, 2019
9358df9
optionally use vpn ip address in place of web address
queglay Dec 23, 2019
e029599
trigger reprovisioning if ip address changes for vpn
queglay Dec 23, 2019
58659bc
remove comments
queglay Dec 23, 2019
b61ca4a
rename open vpn host name
queglay Dec 24, 2019
08ad992
make vpn use count to disable
queglay Dec 27, 2019
d594b59
fix ref to local id
queglay Dec 27, 2019
c71c76e
delete ebs on termination
queglay Dec 27, 2019
43af8de
added bastion dependency
queglay Jan 2, 2020
74a3ce6
delinting
queglay Jan 18, 2020
03c8568
add key info to multiple hosts
queglay Jan 26, 2020
a021d9d
rename base dir
queglay Feb 1, 2020
3ba2565
specify vpn in hosts file
queglay Feb 2, 2020
fffc13b
ensure vpn host is added with a key path
queglay Feb 8, 2020
7ae88c2
wait to resolve dpkg conflict
queglay Feb 8, 2020
1d5e746
merge from deployuser feature
queglay Feb 8, 2020
5c01873
fix route dependencies for destroy
queglay Feb 8, 2020
d03f87c
update and reboot required
queglay Feb 8, 2020
0c20531
Run vpn ping tests after reset.
queglay Mar 13, 2020
6f3dca3
update test
queglay Mar 13, 2020
22dff04
don't update twice
queglay Mar 14, 2020
7bc189b
force remove apt-get lock on openvpn to fix update
queglay Mar 14, 2020
d0f2f19
force remove lock
queglay Mar 14, 2020
a732ce0
Implement fix to apt update issue
queglay Mar 15, 2020
e0a5911
use sudo
queglay Mar 15, 2020
31b161a
fix last line error
queglay Mar 15, 2020
a115a75
remove post ping test
queglay Mar 15, 2020
8f0a3c7
use exit test
queglay Mar 28, 2020
be68521
set python to 2.7
queglay Apr 10, 2020
c7c3580
which python test
queglay Apr 10, 2020
d15ae07
check python location after install
queglay Apr 10, 2020
6181c39
update and upgrade
queglay Apr 10, 2020
b0992c1
make upgrade noninteractive
queglay Apr 10, 2020
e522537
don't upgrade
queglay Apr 10, 2020
6a6de43
add minimal
queglay Apr 10, 2020
e28a7fc
test python 2.7
queglay Apr 10, 2020
764ceaf
install python after reboot
queglay Apr 10, 2020
8331196
fix missing item seperators
queglay Apr 10, 2020
bf832c2
more verbosity
queglay Apr 10, 2020
fc859f8
disable daily update
queglay Apr 11, 2020
edd19d7
remove status
queglay Apr 11, 2020
ca47e4f
escape chars
queglay Apr 11, 2020
751cb18
enable daily service again
queglay Apr 11, 2020
fb57521
fix quotations
queglay Apr 11, 2020
6e56929
dont disable daily service update
queglay Apr 11, 2020
9f8d1a9
revert to 751cb18e1d9acba179c8fff1300117d402da5c22
queglay Apr 11, 2020
5318f0e
test wait before update
queglay Apr 11, 2020
bd4d40e
sudo wait for service
queglay Apr 11, 2020
58e136f
cleanup
queglay Apr 11, 2020
3a7c3c5
ls python only
queglay Apr 11, 2020
554b193
improve output dependencies for openvpn to fix outbound ping errors o…
queglay Apr 18, 2020
d2a96d9
remove ip depends for vpn. may not be needed
queglay Apr 19, 2020
5a52d1c
fix order depends
queglay Apr 22, 2020
c7f71cb
get eip to depend on vpn
queglay Apr 25, 2020
58d2b01
Use bash for default tf interpreter
queglay May 3, 2020
4596c96
remove [[ when not in bash
queglay May 3, 2020
9b8217e
Revert "Use bash for default tf interpreter"
queglay May 7, 2020
acf03ff
set bash as default interpreter
queglay May 7, 2020
4d9f6b8
cleanup
queglay May 8, 2020
0219acd
stadardise tags
queglay May 9, 2020
2c023f9
rempve set -x
queglay May 11, 2020
8c5d4c1
bug-reliable-cleanup
queglay May 17, 2020
2a11bdf
Merge branch 'bug-reliable-cleanup' into dev
queglay May 17, 2020
f7cf2b2
enable set -x
queglay May 23, 2020
115655a
use env var to show commands
queglay May 23, 2020
1570d4a
flip showcommands var
queglay May 24, 2020
bad6c38
feature-green-blue-deployments
queglay Jun 21, 2020
15c31d1
alter comment
queglay Jun 21, 2020
b02dd3f
add routes on ansible control
queglay Jun 21, 2020
ecc6866
assert firehawkgateway exists
queglay Jun 21, 2020
4e465fa
test-no-vpn-public-inventory
queglay Jun 21, 2020
6897dc2
add exit tests
Jul 5, 2020
35657fe
Don't configure routes on workstation unless specified [ci skip]
queglay Jul 19, 2020
6e45c76
imp-auto-ami-vpn
queglay Jul 19, 2020
83f2259
test wild card for vpn image
queglay Jul 20, 2020
bb4e476
update filter values again
queglay Jul 20, 2020
c387177
provide pointers on filets and allow ci skip branch
queglay Jul 20, 2020
0fcd0f0
test auto aquire ami for workstation
queglay Jul 20, 2020
6edc6c8
aws_ami most_recent for workstation
queglay Jul 20, 2020
0df7346
try *.id
queglay Jul 20, 2020
d4c812b
aws_ami_ids for prebuilt search
queglay Jul 20, 2020
0148492
fix first element
queglay Jul 20, 2020
6fbbf63
check dir for grid
queglay Jul 20, 2020
776213e
Use the vpn private ip as the DNS resolver
queglay Aug 15, 2020
ea36cee
remove unneeded vars
queglay Aug 15, 2020
8fecb23
update OpenVPN Access Server 2.8.5
queglay Aug 15, 2020
fcef435
update open vpn filters
queglay Aug 15, 2020
b946c2b
test using product code in filters
queglay Aug 15, 2020
cedbea1
list of strings were required
queglay Aug 15, 2020
1394e7d
update security groups
queglay Aug 15, 2020
41f9f92
set permissions on init bootstrapping instead
queglay Aug 15, 2020
37de6ee
fix comma syntax error
queglay Aug 15, 2020
42933a7
test instance up first
queglay Aug 15, 2020
f4bbca1
sleep 60
queglay Aug 15, 2020
1c57d2e
add gateway dependency
queglay Aug 15, 2020
0dc167e
openvpn-restart-client.yaml
queglay Aug 15, 2020
5750a83
try to wait before restart
queglay Aug 15, 2020
723a720
update to tf .13
queglay Aug 21, 2020
25ca567
test python 3 for vpn
queglay Aug 21, 2020
7baa3c5
try to clean cache
queglay Aug 21, 2020
3db796c
revert to tf .12
queglay Aug 22, 2020
c868ce1
remove versions.tf
queglay Aug 22, 2020
d0dc0c5
search dns
queglay Aug 23, 2020
77d6a6e
remove extra space
queglay Sep 7, 2020
df5c3eb
upgrade to tf.13
queglay Oct 17, 2020
cd4e62c
Add python bootstrap again for testing
queglay Nov 8, 2020
e2135bb
add python 3 install
queglay Nov 8, 2020
dd0bc3f
cleanup
queglay Jan 10, 2021
d727860
imp-vpn-use-preconfigured-ami-vault
queglay Jan 23, 2021
38bbfb4
fix some required vars
queglay Jan 23, 2021
7e911cc
add ami var
queglay Jan 23, 2021
1b5fe1e
add default dependency
queglay Jan 23, 2021
8533bba
close block
queglay Jan 23, 2021
18f65fa
remove duplicate
queglay Jan 23, 2021
2c89809
fix route table ids var
queglay Jan 24, 2021
083fbcf
use setunion
queglay Jan 24, 2021
314f7e9
sort
queglay Jan 24, 2021
9db017d
test sort
queglay Jan 24, 2021
d509ddd
fix (
queglay Jan 24, 2021
330f6c3
remove provision vpn
queglay Jan 24, 2021
1aa3ea1
remove exit_test
queglay Jan 24, 2021
d0d6298
output startup
queglay Jan 24, 2021
f9a40b2
create iam_instance_profile for vpn
queglay Jan 24, 2021
f789be4
update sg group for cloud 9 ssh
queglay Jan 24, 2021
11d8fde
auth vpn vault
queglay Jan 25, 2021
61ebbfe
correct vault role
queglay Jan 25, 2021
cfe88e6
use resourcetier
queglay Jan 25, 2021
9ca8f40
test vault agent
queglay Jan 25, 2021
2080c17
update auth method and policies
queglay Jan 25, 2021
d1b0962
missing brackets
queglay Jan 25, 2021
3ea7cf1
test secret aquisition
queglay Jan 26, 2021
663823a
dynamic-aws-key
queglay Jan 26, 2021
32db4cf
vault-token-auth-vpn
queglay Jan 26, 2021
ab42a13
remove vault_aws_access_credentials
queglay Jan 26, 2021
2cd8298
test output token
queglay Jan 26, 2021
d3e544c
update vault token name
queglay Jan 26, 2021
81ecef5
set token num uses
queglay Jan 26, 2021
31a97da
onlye use exit status
queglay Jan 26, 2021
d2b762f
aquire file with permissions
queglay Jan 26, 2021
06b9fd0
fix double data ref
queglay Jan 26, 2021
9b7f21d
retrieve multiple files
queglay Jan 26, 2021
4dc21ad
internal-vaut-client
queglay Feb 15, 2021
b2b4d48
request vault file
queglay Feb 21, 2021
533982a
request vpn files to client
queglay Feb 21, 2021
83a041c
request-vpn-conf
queglay Feb 21, 2021
77a826f
store files in home dir
queglay Feb 21, 2021
f1faee9
disable permissions
queglay Feb 21, 2021
1163c6c
update docs
queglay Feb 21, 2021
b06d44f
pull json blob
queglay Feb 21, 2021
a5e377b
copy vault file from bastion
queglay Feb 22, 2021
ab3e6a4
add extra vars requird for user data
queglay Feb 24, 2021
8cabaff
test
queglay Feb 26, 2021
a154371
echo inputs
queglay Feb 26, 2021
c070ee2
no-gen-certs-build
queglay Feb 26, 2021
a08dcb5
remove wait boot
queglay Feb 26, 2021
3e68e9b
mkdir seperate
queglay Feb 26, 2021
3382269
store certs in vault
queglay Feb 26, 2021
311f573
fix apt daily timer
queglay Feb 27, 2021
ff79305
fix target logic
queglay Feb 27, 2021
6d7c258
test longer ttl
queglay Feb 27, 2021
acaab2c
update target
queglay Feb 27, 2021
bc212dc
make vault request and download files from remote
queglay Feb 27, 2021
2d3a831
copy files from vault and track ip history
queglay Feb 27, 2021
18509eb
Provide var option for use eip
queglay Feb 27, 2021
85aa482
correct condition
queglay Feb 27, 2021
51d874f
try init
queglay Feb 27, 2021
b14c52f
restore default listeners
queglay Feb 27, 2021
1afbb9b
public_ip fix
queglay Feb 27, 2021
84797ac
update ip aquisition method
queglay Feb 27, 2021
4184a78
relocate file requests to vagrant
queglay Feb 27, 2021
a2eecc1
provide missing vars
queglay Feb 27, 2021
52e812c
Test get1 vpn file
queglay Feb 28, 2021
083e729
cleanup-vars
queglay Mar 1, 2021
5005f7e
update vars, reanme and disable profiles
queglay Mar 2, 2021
94f7c7e
auto generate and write vault
queglay Mar 2, 2021
2ec70d2
fix vars for auto generate password
queglay Mar 2, 2021
d99239e
update ref to bad var
queglay Mar 2, 2021
142cf89
fix vpn ref to tag key and value - missing
queglay Mar 2, 2021
3e8c467
missing server profile
queglay Mar 2, 2021
800fa98
update missing conflict key var
queglay Mar 2, 2021
c7917c2
need to use put and not update for security
queglay Mar 2, 2021
67da641
hide history
queglay Mar 2, 2021
91eaaa0
hide vault input
queglay Mar 2, 2021
bcf14e9
update destroy
queglay Mar 2, 2021
c986da2
py3-command-change
queglay Mar 7, 2021
c9780d0
vpn-role-from-backend
queglay Mar 16, 2021
817949e
correct role name to pass through by data
queglay Mar 16, 2021
091e329
add query token capabilities
queglay Mar 17, 2021
1d92ced
test more capabilities list
queglay Mar 17, 2021
daf1b06
cleanup
queglay Mar 17, 2021
e43fcd7
gitignore-tfplan
queglay Mar 19, 2021
97689de
vpn-iam-auth-method
queglay Mar 22, 2021
54812ea
pass blank string for token
queglay Mar 22, 2021
84ec5ea
update vpn iam auth method
queglay Mar 22, 2021
1afd93a
revoke vault token
queglay Mar 22, 2021
dfe5afc
show input to vault
queglay Mar 22, 2021
5f78439
build-vpn-sg-first
queglay Mar 23, 2021
f33e932
correct variable errors
queglay Mar 23, 2021
8b5d894
add missing locals
queglay Mar 23, 2021
90f05f2
update sg attachments
queglay Mar 23, 2021
8e423f9
remove token usage in orchestrator
queglay Mar 23, 2021
b31839b
update refs to user data
queglay Apr 4, 2021
21b5849
remove uneeded private domain name - using .consul
queglay Apr 6, 2021
dab48ea
route-combined-vpcs-cidr
queglay Apr 11, 2021
d75c804
update-default-path-vpn-certs
queglay Apr 11, 2021
d48da2d
update retrieval paths and register vpn service
queglay Apr 11, 2021
86e0556
fix broken ref
queglay Apr 11, 2021
a1b1512
cleanup
queglay Apr 11, 2021
a488504
end with newline
queglay Apr 11, 2021
985777c
sqs-vpn
queglay Jun 13, 2021
f9cf9f7
correct typo
queglay Jun 13, 2021
6cf8012
update compatibility with tf .13
queglay Jun 13, 2021
049589e
enforce sqs
queglay Jun 13, 2021
da1dbb3
use path to module for script
queglay Jun 13, 2021
18f1a1a
test subsheel
queglay Jun 13, 2021
4357641
update sqs notify heredoc
queglay Jun 14, 2021
bb77016
update sqs message
queglay Jun 14, 2021
61b6bcf
update pass result
queglay Jun 14, 2021
52d073b
test purge queue
queglay Jun 17, 2021
bdc82c8
purge first
queglay Jun 17, 2021
54dae64
purge if non zero
queglay Jun 17, 2021
b524625
syntax error fix
queglay Jun 17, 2021
a8ed1af
echo host args
queglay Jun 17, 2021
2bd07f7
rename message
queglay Jun 19, 2021
67b2aba
cleanup
queglay Jun 19, 2021
77abbba
resolve ip for vpn correctly
queglay Jun 19, 2021
9654b91
remove-deployer-ip
queglay Jan 19, 2022
f8790a7
use-network-interface-id
queglay Feb 21, 2022
f797730
define provider version
queglay Feb 21, 2022
720dc1f
fix missing count attribute
queglay Feb 21, 2022
4e1bf91
try primary_network_interface_id
queglay Feb 21, 2022
27c23e8
Update AWS to 4.30
queglay Mar 1, 2022
3fee588
update-versions
queglay Mar 20, 2022
8172b31
Update versions
queglay Mar 27, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
private-variables.tf
.terraform
.terraform.lock.hcl
119 changes: 117 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,62 @@

Terraform module which creates OpenVPN on AWS

## This module is creating the following resources:
# Important steps for permissions and startvpn.sh

*IMPORTANT: you will need to have the permissions locked down tight in on startvpn.sh for this to be secure.
Make the file owned by root and group root:*

sudo chown root:root startvpn.sh

Now set the SetUID bit, make it executable for all and writable only by root:

sudo chmod 4755 startvpn.sh
sudo chmod +s startvpn.sh


edit the sudoers file to conatin this line, which will allow these vpn autologin files to be copied to /etc without a password.

```
deadlineuser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa /home/deadlineuser/openvpn_config/ca.crt /etc/openvpn/.
deadlineuser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa /home/deadlineuser/openvpn_config/client.crt /etc/openvpn/.
deadlineuser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa /home/deadlineuser/openvpn_config/client.key /etc/openvpn/.
deadlineuser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa /home/deadlineuser/openvpn_config/openvpn.conf /etc/openvpn/.
deadlineuser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa /home/deadlineuser/openvpn_config/ta.key /etc/openvpn/.
deadlineuser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa /home/deadlineuser/openvpn_config/yourserver.txt /etc/openvpn/.

/home/deadlineuser ALL=(ALL:ALL) NOPASSWD:/bin/systemctl daemon-reload
/home/deadlineuser ALL=(ALL:ALL) NOPASSWD:/usr/sbin/service openvpn restart
```

instead, you may want to allow a group of users to be able to do this.

Edit: THIS DIDN'T ACTUALLY WORK BECAUSE WE CANT USE RELATIVE PATHS IN SUDOERS.
the right way to do it if needed would be to have a non home dir path temp location, with appropraite permissions to read and write by the group on within that path.

```
%deadlineanduser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa ~/openvpn_config/ca.crt /etc/openvpn/.
%deadlineanduser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa ~/openvpn_config/client.crt /etc/openvpn/.
%deadlineanduser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa ~/openvpn_config/client.key /etc/openvpn/.
%deadlineanduser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa ~/openvpn_config/openvpn.conf /etc/openvpn/.
%deadlineanduser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa ~/openvpn_config/ta.key /etc/openvpn/.
%deadlineanduser ALL=(ALL:ALL) NOPASSWD:/bin/cp -rfa ~/openvpn_config/yourserver.txt /etc/openvpn/.

%deadlineanduser ALL=(ALL:ALL) NOPASSWD:/bin/systemctl daemon-reload
%deadlineanduser ALL=(ALL:ALL) NOPASSWD:/usr/sbin/service openvpn restart
```

Keep in mind if this script will allow any input or editing of files, this will also be done as root. some more references on related subjects:
https://bbs.archlinux.org/viewtopic.php?id=126126
https://askubuntu.com/questions/229800/how-to-auto-start-openvpn-client-on-ubuntu-cli
https://serverfault.com/questions/480909/how-can-i-run-openvpn-as-daemon-sending-a-config-file

startvpn.sh is currently how open vpn configuration is handled locally. the files retrieved from remote access server
are needed for auto login to work.

It would be better to replace this with an Ansible playbook instead.


## the tf_aws_openvpn module is creating the following resources:

1. Two Route53 Records
a. vpn-web.domain.com
Expand Down Expand Up @@ -45,7 +100,7 @@ module "openvpn" {
vpc_cidr = "${var.vpc_cidr}"
public_subnet_ids = "${var.public_subnet_ids}"
# EC2 Inputs
key_name = "${var.key_name}"
key_name = "${var.aws_key_name}"
private_key = "${var.private_key}"
ami = "${var.ami}"
instance_type = "${var.instance_type}"
Expand All @@ -61,9 +116,69 @@ module "openvpn" {
}
```

## Important Notes for Routing:

You can check /var/log/syslog to confirm vpn connection.
check autoload is set to all or openvpn in /etc/default
ensure startvpn.sh is in ~/openvpn_config. openvpn.conf auto login files are constructed here and placed in /etc/openvpn before execution.

read more here to learn about setting up routes
https://openvpn.net/vpn-server-resources/site-to-site-routing-explained-in-detail/
https://askubuntu.com/questions/612840/adding-route-on-client-using-openvpn

You will need ip forwarding on client and server if routing both sides.
https://community.openvpn.net/openvpn/wiki/265-how-do-i-enable-ip-forwarding

**These are the manual steps required to get both private subnets to connect, and we'd love to figure out the equivalent commands drop in when I'm provisioning the access server to automate them, but for now these are manual steps.**

- Should VPN clients have access to private subnets
(non-public networks on the server side)?
Yes, enable routing

- Specify the private subnets to which all clients should be given access (one per line):
10.0.101.0/24
10.0.1.0/24
(these subnets are in aws, the open vpn access server resides in the 10.0.101.0/24 subnet)

- Allow access from these private subnets to all VPN client IP addresses and subnets : on

- in user permissions / user
configure vpn gateway:
yes

- Allow client to act as VPN gateway (enter the cidr block for your onsite network)
for these client-side subnets:
192.168.92.0/24

At this point, your client side vpn client should be able to ping any private ip, and if you ssh into one of those ips, it whould be able to ping your client side ip with its private ip address.

If not you will have to trouble shoot before you can continue further because this functionality is required.

if you intend to provide access to other systems on your local network, promiscuous mode must enabled on host ethernet adapters. for example, if openvpn client is in ubuntu vm, and we are running the vm with bridged ethernet in a linux host, then enabling promiscuous mode, and setting up a static route is needed in the host.
https://askubuntu.com/questions/430355/configure-a-network-interface-into-promiscuous-mode
for example, if you use a rhel host run this in the host to provide static route to the adaptor inside the vm (should be on the same subnet)
```
sudo ip route add 10.0.0.0/16 via [ip adress of the bridged ethernet adaptor in the vm]
```
check routes with:
```
sudo route -n
ifconfig eth1 up
ifconfig eth1 promisc
```

In the ubuntu vm where where terraform is running, ip forwarding must be on. You must be using a bridged adaptor.
http://www.networkinghowtos.com/howto/enable-ip-forwarding-on-ubuntu-13-04/

```
sudo sysctl net.ipv4.ip_forward=1
```


## Authors

Created and maintained by [Quentin Rousseau](https://github.com/kwent) (contact@quent.in).
Autostart and Routing Abilities in this fork by Andrew Graham (https://github.com/queglay/) (queglay@gmail.com)

## License

Expand Down
2 changes: 2 additions & 0 deletions gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
# plan files are temporary
**/tfplan
Loading