Skip to content

Instantly share code, notes, and snippets.

😃
"A smooth sea never made a skilled sailor."

Phillip Bailey p0bailey

😃
"A smooth sea never made a skilled sailor."
Block or report user

Report or block p0bailey

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View .gitignore
env/
venv/
*.pyc
db.sqlite3
@p0bailey
p0bailey / MalformedPolicyDocument: Invalid principal in policy: "AWS"
Created Jun 8, 2016
MalformedPolicyDocument: Invalid principal in policy: "AWS"
View MalformedPolicyDocument: Invalid principal in policy: "AWS"
terraform apply -var-file=../../aws.tfvars
aws_iam_role.SecurityMonkeyInstanceProfile: Creating...
arn: "" => "<computed>"
assume_role_policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n }"
name: "" => "SecurityMonkeyInstanceProfile"
path: "" => "/"
unique_id: "" => "<computed>"
aws_iam_role.SecurityMonkeyInstanceProfile: Creation complete
aws_iam_role.SecurityMonkey: Creating...
arn: "" => "<computed>"
View gist:7a1359bf27d53ec1c266651abce5507f
# -*- mode: ruby -*-
# vi: set ft=ruby :
# Vagrantfile API/syntax version. Don't touch unless you know what you're doing!
VAGRANTFILE_API_VERSION = "2"
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
config.vm.provision :hosts do |provisioner|
provisioner.autoconfigure = true
@p0bailey
p0bailey / README.md
Last active Aug 1, 2019
Terraform Module README
View README.md

demo terraform module

A terraform module to provide a in AWS/AZURE/ETC,ETC.

This should be used an a generic template to be included in every terraform module.

Module Input Variables

View keybase.md
{
    "body": {
        "key": {
            "eldest_kid": "0120b09faec5a707c96c64c74fd2531cd384e00490422fb6e7fc5249adf8ff1228eb0a",
            "host": "keybase.io",
            "kid": "0120b09faec5a707c96c64c74fd2531cd384e00490422fb6e7fc5249adf8ff1228eb0a",
            "uid": "5f7e6bea1f97ceb2f1d0916f9054d119",
            "username": "pbailey"
        },
@p0bailey
p0bailey / Makefile
Created Apr 4, 2017
Terraform Makefile
View Makefile
MAKEFLAGS += --silent
.PHONY: all init plan apply show destroy output graph
all:
@grep -E '^[a-zA-Z_-]+:.*?## .*$$' $(MAKEFILE_LIST) | sort | awk 'BEGIN {FS = ":.*?## "}; {printf "\033[36m%-30s\033[0m %s\n", $$1, $$2}'
init: ## Initialize a new or existing Terraform configuration
terraform get
terraform validate
terraform init
@p0bailey
p0bailey / mfa.tf
Last active Oct 27, 2017
terraform iam group aws api mfa protected
View mfa.tf
resource "aws_iam_group" "ec2Admins" {
name = "ec2Admins"
}
resource "aws_iam_group_policy" "force_MFA_on_apikeys_policy" {
name = "force_MFA_on_apikeys_policy"
group = "${aws_iam_group.ec2Admins.id}"
depends_on = ["aws_iam_group.ec2Admins"]
policy = <<EOF
@p0bailey
p0bailey / mfa_ip_lockdown.tf
Created Oct 27, 2017
terraform iam group aws api mfa protected plus ip lockdown
View mfa_ip_lockdown.tf
resource "aws_iam_group" "ec2Admins" {
name = "ec2Admins"
}
resource "aws_iam_group_policy" "force_MFA_on_apikeys_policy" {
name = "force_MFA_on_apikeys_policy"
group = "${aws_iam_group.ec2Admins.id}"
depends_on = ["aws_iam_group.ec2Admins"]
policy = <<EOF
You can’t perform that action at this time.