Skip to content

Instantly share code, notes, and snippets.

@ezalejski
ezalejski / keybase.md
Last active September 16, 2015 09:58
keybase.md

Keybase proof

I hereby claim:

  • I am ezalejski on github.
  • I am ezalejski (https://keybase.io/ezalejski) on keybase.
  • I have a public key whose fingerprint is 3F41 2F21 DC30 7AC8 546B B116 E4F6 FD8B 54A6 CD47

To claim this, I am signing this object:

resource "aws_instance" "lb" {
disable_api_termination = false
count = "${var.lb_instances_count}"
ami = "${var.lb_ami_id}"
instance_type = "${var.lb_ami_type}"
tags {
Name = "${format("lb%d-%s", count.index+1, var.environment)}"
}
vpc_security_group_ids = [ "${aws_security_group.main.id}", "${aws_security_group.lb.id}"]
subnet_id = "${aws_subnet.a.id}"
@ezalejski
ezalejski / gist:f34fd8220c97abfdac88ba53e2942622
Created May 11, 2017 10:39 — forked from ajbrown/gist:8aea5189d8e84046a4f2
BackWPup S3 permissions. This includes the minimum permissions needed to allow the Wordpress BackWPup plugin to complete a backup job with an Amazon S3 destination.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Stmt1457967512000",
"Effect": "Allow",
"Action": [
"s3:ListAllMyBuckets"
],
"Resource": [
package main
import (
"fmt"
"io"
"os"
)
var path = "/Users/novalagung/Documents/temp/test.txt"
@ezalejski
ezalejski / iam.tf
Created May 31, 2017 09:27
Terraform IAM User Group and Custom Policy
#User
resource "aws_iam_user" "ErykZalejski" {
name = "ErykZalejski"
path = "/"
}
#Group Membership
resource "aws_iam_group_membership" "aws-readonly" {
name = "aws-readonly-${var.environment}"
@ezalejski
ezalejski / keybase+git-crypt.md
Created February 2, 2018 16:28 — forked from 3noch/keybase+git-crypt.md
How to add a Keybase user to your repo using git-crypt
keybase pgp pull <keybase.io user>
gpg --edit-key <keybase.io user>
  > lsign
  > save
git-crypt add-gpg-user <keybase.io user>
@ezalejski
ezalejski / bash-cheatsheet.sh
Created May 9, 2018 08:11 — forked from LeCoupa/bash-cheatsheet.sh
Bash CheatSheet for UNIX Systems --> UPDATED VERSION --> https://github.com/LeCoupa/awesome-cheatsheets
#!/bin/bash
#####################################################
# Name: Bash CheatSheet for Mac OSX
#
# A little overlook of the Bash basics
#
# Usage:
#
# Author: J. Le Coupanec
# Date: 2014/11/04
@ezalejski
ezalejski / credentials_example
Created February 27, 2020 10:08
credentials_example
[quoka-master]
aws_access_key_id = <YOUR_ACCESS_KEY_ID>
aws_secret_access_key = <YOUR_SECRET_ACCESS_KEY>
[quoka-prod]
role_arn = arn:aws:iam::<PROD_ACCOUNT_ID>:role/administrator-access
source_profile = quoka-master
[quoka-dev]
role_arn = arn:aws:iam::<DEV_ACCOUNT_ID>:role/administrator-access
source_profile = quoka-master
@ezalejski
ezalejski / providers.tf
Created February 27, 2020 10:11
Terraform providers example
provider "aws" {
region = var.aws_region
#Use an assumed role from the target account.
assume_role {
role_arn = "arn:aws:iam::<PROD_ACCOUNT_ID>:role/administrator-access"
}
}
@ezalejski
ezalejski / assumed_roles.tf
Last active February 27, 2020 15:22
Allowing master account to manage access via AssumeRole
## re-using aws 'administrator_access' policy
data "aws_iam_policy" "administrator_access" {
arn = "arn:aws:iam::aws:policy/AdministratorAccess"
}
## allowing master account to manage access via AssumeRole
data "aws_iam_policy_document" "master_account_assume_role_policy" {
statement {
actions = ["sts:AssumeRole"]
principals {
type = "AWS"