aws_security_viz 0.2.2.pre.alpha.pre.393 → 0.2.2.pre.alpha.pre.400

Sign up to get free protection for your applications and to get access to all the features.
Files changed (4) hide show
  1. checksums.yaml +4 -4
  2. data/.dockerignore +7 -0
  3. data/README.md +22 -6
  4. metadata +3 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9ea98a6c4cbfc3b7522b259b891a028e4da4dc58130c95b38ed3a88bb3c4e09c
4
- data.tar.gz: f42bb25db27bf6f622db3303f57a8ea9bbb78fa01a43172cdf6ee3cbef8e8103
3
+ metadata.gz: bf64ee3c9a38791796b296adce6cc20a5bda9e94e6da4ebe285bd714008002c5
4
+ data.tar.gz: 14f319691b028142394865d573cac232115b02a3677a3cae33b6d9a557fc5d60
5
5
  SHA512:
6
- metadata.gz: ee40154da3d080ccb2343762e6e4235b3017c890f41c31ffdcbf065325c763f540f96ba9520fe4160129c4c3f58cd7f40b677f4b1e201973a87b65fc305f812e
7
- data.tar.gz: cae971a0c09e384d2fad7eb278033e88e12a1f68f5c1a66b7dc1f804b46017dcc3f451b53ae9b6ffa326b7e05c0645ff753b5c182c44ef1e78cdcc17876e3161
6
+ metadata.gz: c0358c805821acdb6e9ff0b4ffb616d72909bf28f17ed64a3afb82f0ce990e3e594ff482fa8598bd6ec8e048bf6c0df2d5323a625e447350510d8f6cd2aeb95f
7
+ data.tar.gz: 67e02863e58e68f575f5fe1158f8f20d6e6cde7b96f859e8d2fb0b1e3eb9b507573a0fa4bf0871ccda8a24c8821f369e3b221c25506ead8db550b85f6bd78a6f
@@ -0,0 +1,7 @@
1
+ .git
2
+ .bundle
3
+ *.svg
4
+ *.dot
5
+ *.png
6
+ .DS_Store
7
+ navigator.html
data/README.md CHANGED
@@ -51,16 +51,32 @@ To generate a web view
51
51
 
52
52
  ## DOCKER USAGE
53
53
 
54
-
55
- ## Cleanup + add Docker from off the shelf image
56
54
  If you don't want to install the dependencies and ruby libs you can execute aws-security-viz inside a docker container. To do so, follow these steps:
57
55
 
58
56
  1. Clone this repository, open it in a console.
59
57
  2. Build the docker container: `docker build -t sec-viz .`
60
- 3. Run the container: `docker run -i --rm -t -p 3000:3000 -v $(pwd)/aws-viz:/aws-security-viz --name sec-viz sec-viz` (Description: `-i` interactive shell, `--rm` remove the container after usage, `-t` attach this terminal to it, `-p 3000:3000` we expose port 3000 for the HTTP server, `-v $(pwd)/aws-viz:aws-security-viz` mount tmp directory for generated artifacts, `-name sec-viz` the container will have the same name as the image we will start)
61
- 4. Now you can use the tool as described in [usage](#USAGE). Make sure that you use the commands with `bundler exec ` as prefix. For example: `aws_security_viz -a your_aws_key -s your_aws_secret_key -f aws.json`.
62
- 5. To start the web view, execute `ruby -run -e httpd -- -p 3000` in the container. You can open it with your local browser at `http://0.0.0.0:3000/`. There you can view the generated images and the graph. Use `Ctrl+C` to close the HTTP server.
63
- 6. Terminate the docker container by typing `exit` in the console.
58
+
59
+ 3.a With aws-vault (Recommended):
60
+
61
+ ```aws-vault exec tldev -- docker run -i -e AWS_REGION -e AWS_ACCESS_KEY_ID -e AWS_SECRET_ACCESS_KEY -e AWS_SESSION_TOKEN -e AWS_SECURITY_TOKEN --rm -t -p 3000:3000 -v (pwd)/aws-viz:/aws-security-viz --name sec-viz sec-viz /usr/local/bundle/bin/aws_security_viz --renderer navigator --serve 3000``` .
62
+
63
+ You can open it with your local browser at `http://localhost:3000/navigator.html#aws-security-viz.png`.
64
+
65
+ 3.b With AWS credentials passed as parameters:
66
+
67
+ ```docker run -i --rm -t -p 3000:3000 -v (pwd)/aws-viz:/aws-security-viz --name sec-viz sec-viz /usr/local/bundle/bin/aws_security_viz -a REPLACE_AWS_ACCESS_KEY_ID -s REPLACE_SECRET --renderer navigator --serve 3000```.
68
+
69
+ You can open it with your local browser at `http://localhost:3000/navigator.html#aws-security-viz.png`.
70
+
71
+ Parameters passed to the docker command:
72
+ * `-v $(pwd)/aws-viz:aws-security-viz` local directory where output will be generated.
73
+ * `-i` interactive shell
74
+ * `--rm` remove the container after usage
75
+ * `-t` attach this terminal to it
76
+ * `-p 3000:3000` we expose port 3000 for the HTTP server
77
+ * `-name sec-viz` the container will have the same name as the image we will start
78
+
79
+ You can also use other parameters as specified in [usage](#USAGE)
64
80
 
65
81
  ### Help
66
82
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws_security_viz
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.2.pre.alpha.pre.393
4
+ version: 0.2.2.pre.alpha.pre.400
5
5
  platform: ruby
6
6
  authors:
7
7
  - Anay Nayak
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2020-07-26 00:00:00.000000000 Z
11
+ date: 2020-08-16 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler
@@ -174,6 +174,7 @@ executables:
174
174
  extensions: []
175
175
  extra_rdoc_files: []
176
176
  files:
177
+ - ".dockerignore"
177
178
  - ".editorconfig"
178
179
  - ".gitignore"
179
180
  - ".travis.yml"