This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
env/ | |
venv/ | |
*.pyc | |
db.sqlite3 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
terraform apply -var-file=../../aws.tfvars | |
aws_iam_role.SecurityMonkeyInstanceProfile: Creating... | |
arn: "" => "<computed>" | |
assume_role_policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n }" | |
name: "" => "SecurityMonkeyInstanceProfile" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
aws_iam_role.SecurityMonkeyInstanceProfile: Creation complete | |
aws_iam_role.SecurityMonkey: Creating... | |
arn: "" => "<computed>" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
# Vagrantfile API/syntax version. Don't touch unless you know what you're doing! | |
VAGRANTFILE_API_VERSION = "2" | |
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config| | |
config.vm.provision :hosts do |provisioner| | |
provisioner.autoconfigure = true |
{
"body": {
"key": {
"eldest_kid": "0120b09faec5a707c96c64c74fd2531cd384e00490422fb6e7fc5249adf8ff1228eb0a",
"host": "keybase.io",
"kid": "0120b09faec5a707c96c64c74fd2531cd384e00490422fb6e7fc5249adf8ff1228eb0a",
"uid": "5f7e6bea1f97ceb2f1d0916f9054d119",
"username": "pbailey"
},
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
MAKEFLAGS += --silent | |
.PHONY: all init plan apply show destroy output graph | |
all: | |
@grep -E '^[a-zA-Z_-]+:.*?## .*$$' $(MAKEFILE_LIST) | sort | awk 'BEGIN {FS = ":.*?## "}; {printf "\033[36m%-30s\033[0m %s\n", $$1, $$2}' | |
init: ## Initialize a new or existing Terraform configuration | |
terraform validate | |
terraform init |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
resource "aws_iam_group" "ec2Admins" { | |
name = "ec2Admins" | |
} | |
resource "aws_iam_group_policy" "force_MFA_on_apikeys_policy" { | |
name = "force_MFA_on_apikeys_policy" | |
group = "${aws_iam_group.ec2Admins.id}" | |
depends_on = ["aws_iam_group.ec2Admins"] | |
policy = <<EOF |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
resource "aws_iam_group" "ec2Admins" { | |
name = "ec2Admins" | |
} | |
resource "aws_iam_group_policy" "force_MFA_on_apikeys_policy" { | |
name = "force_MFA_on_apikeys_policy" | |
group = "${aws_iam_group.ec2Admins.id}" | |
depends_on = ["aws_iam_group.ec2Admins"] | |
policy = <<EOF |
OlderNewer