Skip to content

Instantly share code, notes, and snippets.

😃
"A smooth sea never made a skilled sailor."

Phillip Bailey p0bailey

😃
"A smooth sea never made a skilled sailor."
View GitHub Profile
View .gitignore
env/
venv/
*.pyc
db.sqlite3
@p0bailey
p0bailey / MalformedPolicyDocument: Invalid principal in policy: "AWS"
Created Jun 8, 2016
MalformedPolicyDocument: Invalid principal in policy: "AWS"
View MalformedPolicyDocument: Invalid principal in policy: "AWS"
terraform apply -var-file=../../aws.tfvars
aws_iam_role.SecurityMonkeyInstanceProfile: Creating...
arn: "" => "<computed>"
assume_role_policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n }"
name: "" => "SecurityMonkeyInstanceProfile"
path: "" => "/"
unique_id: "" => "<computed>"
aws_iam_role.SecurityMonkeyInstanceProfile: Creation complete
aws_iam_role.SecurityMonkey: Creating...
arn: "" => "<computed>"
View gist:7a1359bf27d53ec1c266651abce5507f
# -*- mode: ruby -*-
# vi: set ft=ruby :
# Vagrantfile API/syntax version. Don't touch unless you know what you're doing!
VAGRANTFILE_API_VERSION = "2"
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
config.vm.provision :hosts do |provisioner|
provisioner.autoconfigure = true
@p0bailey
p0bailey / README.md
Last active Aug 1, 2019
Terraform Module README
View README.md

demo terraform module

A terraform module to provide a in AWS/AZURE/ETC,ETC.

This should be used an a generic template to be included in every terraform module.

Module Input Variables

View keybase.md
{
    "body": {
        "key": {
            "eldest_kid": "0120b09faec5a707c96c64c74fd2531cd384e00490422fb6e7fc5249adf8ff1228eb0a",
            "host": "keybase.io",
            "kid": "0120b09faec5a707c96c64c74fd2531cd384e00490422fb6e7fc5249adf8ff1228eb0a",
            "uid": "5f7e6bea1f97ceb2f1d0916f9054d119",
            "username": "pbailey"
        },
@p0bailey
p0bailey / Makefile
Created Apr 4, 2017
Terraform Makefile
View Makefile
MAKEFLAGS += --silent
.PHONY: all init plan apply show destroy output graph
all:
@grep -E '^[a-zA-Z_-]+:.*?## .*$$' $(MAKEFILE_LIST) | sort | awk 'BEGIN {FS = ":.*?## "}; {printf "\033[36m%-30s\033[0m %s\n", $$1, $$2}'
init: ## Initialize a new or existing Terraform configuration
terraform get
terraform validate
terraform init
@p0bailey
p0bailey / mfa.tf
Last active Oct 27, 2017
terraform iam group aws api mfa protected
View mfa.tf
resource "aws_iam_group" "ec2Admins" {
name = "ec2Admins"
}
resource "aws_iam_group_policy" "force_MFA_on_apikeys_policy" {
name = "force_MFA_on_apikeys_policy"
group = "${aws_iam_group.ec2Admins.id}"
depends_on = ["aws_iam_group.ec2Admins"]
policy = <<EOF
@p0bailey
p0bailey / mfa_ip_lockdown.tf
Created Oct 27, 2017
terraform iam group aws api mfa protected plus ip lockdown
View mfa_ip_lockdown.tf
resource "aws_iam_group" "ec2Admins" {
name = "ec2Admins"
}
resource "aws_iam_group_policy" "force_MFA_on_apikeys_policy" {
name = "force_MFA_on_apikeys_policy"
group = "${aws_iam_group.ec2Admins.id}"
depends_on = ["aws_iam_group.ec2Admins"]
policy = <<EOF
You can’t perform that action at this time.