I hereby claim:
- I am ezalejski on github.
- I am ezalejski (https://keybase.io/ezalejski) on keybase.
- I have a public key whose fingerprint is 3F41 2F21 DC30 7AC8 546B B116 E4F6 FD8B 54A6 CD47
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
resource "aws_instance" "lb" { | |
disable_api_termination = false | |
count = "${var.lb_instances_count}" | |
ami = "${var.lb_ami_id}" | |
instance_type = "${var.lb_ami_type}" | |
tags { | |
Name = "${format("lb%d-%s", count.index+1, var.environment)}" | |
} | |
vpc_security_group_ids = [ "${aws_security_group.main.id}", "${aws_security_group.lb.id}"] | |
subnet_id = "${aws_subnet.a.id}" |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Sid": "Stmt1457967512000", | |
"Effect": "Allow", | |
"Action": [ | |
"s3:ListAllMyBuckets" | |
], | |
"Resource": [ |
package main | |
import ( | |
"fmt" | |
"io" | |
"os" | |
) | |
var path = "/Users/novalagung/Documents/temp/test.txt" |
#User | |
resource "aws_iam_user" "ErykZalejski" { | |
name = "ErykZalejski" | |
path = "/" | |
} | |
#Group Membership | |
resource "aws_iam_group_membership" "aws-readonly" { | |
name = "aws-readonly-${var.environment}" |
keybase pgp pull <keybase.io user>
gpg --edit-key <keybase.io user>
> lsign
> save
git-crypt add-gpg-user <keybase.io user>
#!/bin/bash | |
##################################################### | |
# Name: Bash CheatSheet for Mac OSX | |
# | |
# A little overlook of the Bash basics | |
# | |
# Usage: | |
# | |
# Author: J. Le Coupanec | |
# Date: 2014/11/04 |
[quoka-master] | |
aws_access_key_id = <YOUR_ACCESS_KEY_ID> | |
aws_secret_access_key = <YOUR_SECRET_ACCESS_KEY> | |
[quoka-prod] | |
role_arn = arn:aws:iam::<PROD_ACCOUNT_ID>:role/administrator-access | |
source_profile = quoka-master | |
[quoka-dev] | |
role_arn = arn:aws:iam::<DEV_ACCOUNT_ID>:role/administrator-access | |
source_profile = quoka-master |
provider "aws" { | |
region = var.aws_region | |
#Use an assumed role from the target account. | |
assume_role { | |
role_arn = "arn:aws:iam::<PROD_ACCOUNT_ID>:role/administrator-access" | |
} | |
} |
## re-using aws 'administrator_access' policy | |
data "aws_iam_policy" "administrator_access" { | |
arn = "arn:aws:iam::aws:policy/AdministratorAccess" | |
} | |
## allowing master account to manage access via AssumeRole | |
data "aws_iam_policy_document" "master_account_assume_role_policy" { | |
statement { | |
actions = ["sts:AssumeRole"] | |
principals { | |
type = "AWS" |