Skip to content

Instantly share code, notes, and snippets.

@loganmeetsworld
Created April 19, 2018 12:11
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save loganmeetsworld/66174f70313a24a2716f00e10caf88e2 to your computer and use it in GitHub Desktop.
Save loganmeetsworld/66174f70313a24a2716f00e10caf88e2 to your computer and use it in GitHub Desktop.
security_groups = ec2.describe_security_groups()
bastion_dynamic_security_group = next(d for d in security_groups['SecurityGroups'] if d['GroupName'].endswith(CLUSTER + "-bastion-dynamic"))
# Revoke any ip ranges that contain a description with a time limit that exceeds the limit we set
ip_ranges_to_revoke = get_ip_ranges_to_revoke(bastion_dynamic_security_group, time_limit=6)
if ip_ranges_to_revoke:
ip_permissions_to_revoke = bastion_dynamic_security_group['IpPermissions']
ip_permissions_to_revoke[0]['IpRanges'] = ip_ranges_to_revoke
ec2.revoke_security_group_ingress(GroupId=bastion_dynamic_security_group['GroupId'], IpPermissions=ip_permissions_to_revoke)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment