aws_security_viz 0.2.1.pre.alpha.pre.235 → 0.2.1.pre.alpha.pre.261

Sign up to get free protection for your applications and to get access to all the features.
Files changed (8) hide show
  1. checksums.yaml +4 -4
  2. data/.editorconfig +17 -0
  3. data/.gitignore +9 -0
  4. data/.travis.yml +14 -6
  5. data/Dockerfile +1 -1
  6. data/README.md +29 -3
  7. data/Rakefile +11 -0
  8. metadata +3 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1ba0f2056be4cce36f83ec4b56f37187f3a6c7bc2f6e58484fc6079644a4f09e
4
- data.tar.gz: b02f5ccd754c2276bdb61923edb982c52973cc24a98300703f63f940456d0955
3
+ metadata.gz: f622815ba33c8b92e41b01ac92c796a46739ab6dbe2a91f434a9827e165c6133
4
+ data.tar.gz: 37178e26942e1a899d6cb2728885f4814beefa6ab0d5f0204793530dc5738a5e
5
5
  SHA512:
6
- metadata.gz: 2b7dbbde56bdd7029c13e2758afac897dd9e13252c7f2cb04d73a2f0a58493fb50c932458a967529f38f96355786600726be0c2065ad2b6f1ea9547cb2ee4419
7
- data.tar.gz: 30cbb460f829e0e0a0bcde3b15b29b38721abaaed0b803f733ffaeb31064d1a7b0ba047e516be4b4416a7758404d8742b97e261b0330e1614c18d2e0a1bad738
6
+ metadata.gz: 1e235bce6eeae78fa43d09b8e1d526748ecd34fdfd35a2fc83e6651150d1f2e163496b613a1d627a18cd08f3e3ecbe639f150094dff8720c08724486f1eff5f7
7
+ data.tar.gz: 6fc470b34b6c1e21a8fdb7d1a26cd8db6f847767232c2099fb6d22df79a19518e4299e15a091386568d12c375cea955e300a06b8a90effb9b57d85ab0410ddc2
@@ -0,0 +1,17 @@
1
+ root = true
2
+
3
+ [*]
4
+ end_of_line = lf
5
+ insert_final_newline = true
6
+
7
+ [*.rb]
8
+ charset = utf-8
9
+ indent_style = space
10
+ indent_size = 2
11
+
12
+ [Makefile]
13
+ indent_style = tab
14
+
15
+ [.travis.yml]
16
+ indent_style = space
17
+ indent_size = 2
data/.gitignore CHANGED
@@ -32,3 +32,12 @@ opts.yml
32
32
 
33
33
  .vagrant
34
34
  Gemfile.lock
35
+
36
+ # in case you run the sample commands in this directory..
37
+ viz.svg
38
+ aws.json
39
+ navigator.html
40
+ *.png
41
+ *.dot
42
+ *.svg
43
+ .DS_Store
@@ -27,10 +27,18 @@ cache: bundler
27
27
 
28
28
  sudo: false
29
29
 
30
+ services:
31
+ - docker
32
+
30
33
  deploy:
31
- provider: rubygems
32
- api_key:
33
- secure: FolEBkQI4oiqjZMzuZ/ELSJFxwCrUTmVhew+tr8yrDONOgphjvbOkDFMdPKnM48nMBekz0lS/yh6Ib5JXe0gxk6+fUq/37eNVF7eFc9poTJhJ2I6zkYOunxSTDInLy/Hxl90RXjKNnL+PFNPPZjLSXrUWeUxLViI00Dkfa9iT6s=
34
- gem: aws_security_viz
35
- on:
36
- repo: anaynayak/aws-security-viz
34
+ - provider: rubygems
35
+ api_key:
36
+ secure: YCC4KmUL1dzcpNq2QzZGl+favvFqfX5o2q1zcxIhmMCi53kxjjy7cjYw8xWacDtKKiS0dVDdZ6PckxoIK97qlMpBRupxvhvLUOAAhYfumuIr4tGP5vptaXG3hGKgc39wIs7tlbc8JWEehsZ2kBTE9nms4+Fu9e8+WGslN70OUFw=
37
+ gem: aws_security_viz
38
+ on:
39
+ repo: anaynayak/aws-security-viz
40
+ branch: master
41
+ - provider: script
42
+ script: rake docker:push
43
+ on:
44
+ branch: master
data/Dockerfile CHANGED
@@ -2,4 +2,4 @@ FROM ruby:2.6-alpine
2
2
  RUN apk add --update graphviz ttf-ubuntu-font-family
3
3
  RUN gem install aws_security_viz --pre
4
4
  WORKDIR /aws-security-viz
5
- ENTRYPOINT ["/bin/sh"]
5
+ CMD ["aws_security_viz"]
data/README.md CHANGED
@@ -23,9 +23,9 @@ aws-security-viz -- A tool to visualize aws security groups
23
23
 
24
24
  ## DEPENDENCIES
25
25
 
26
- * graphviz with triangulation `brew install graphviz --with-gts`
26
+ * graphviz `brew install graphviz`
27
27
 
28
- ## USAGE
28
+ ## USAGE (See Examples section below for more)
29
29
 
30
30
  To generate the graph directly using AWS keys
31
31
 
@@ -51,6 +51,8 @@ To generate a web view
51
51
 
52
52
  ## DOCKER USAGE
53
53
 
54
+
55
+ ## Cleanup + add Docker from off the shelf image
54
56
  If you don't want to install the dependencies and ruby libs you can execute aws-security-viz inside a docker container. To do so, follow these steps:
55
57
 
56
58
  1. Clone this repository, open it in a console.
@@ -112,13 +114,14 @@ Execute the following command to generate the json. You will need [aws-cli](http
112
114
 
113
115
  `aws ec2 describe-security-groups`
114
116
 
117
+
115
118
  ## EXAMPLES
116
119
 
117
120
  #### Graphviz export
118
121
 
119
122
  ![](https://github.com/anaynayak/aws-security-viz/raw/master/images/sample.png)
120
123
 
121
- #### Navigator view
124
+ #### Navigator view (useful with very large number of nodes)
122
125
  Via navigator renderer `aws_security_viz -a your_aws_key -s your_aws_secret_key -f aws.json --renderer navigator`
123
126
  ![](https://user-images.githubusercontent.com/416211/51426583-bb5e0180-1c12-11e9-903b-7b2a2d354ede.png)
124
127
 
@@ -126,3 +129,26 @@ Via navigator renderer `aws_security_viz -a your_aws_key -s your_aws_secret_key
126
129
  Via json renderer `aws_security_viz -a your_aws_key -s your_aws_secret_key -f aws.json --renderer json`
127
130
  ![](https://cloud.githubusercontent.com/assets/416211/11912582/0e66cdbc-a669-11e5-82ab-1e26e3c6949b.png)
128
131
 
132
+ ## Additional examples
133
+
134
+ #### Generate `aws-security-viz.png` image for `us-west-1` region
135
+
136
+ ```
137
+ $ aws_security_viz --region us-west-1 -f aws-security-viz.png
138
+ ```
139
+
140
+ #### Generate visualization for `us-west-1` with target filter as `sec-group-1`. This will display all routes through which we can arrive at `sec-group-1`
141
+
142
+ ```
143
+ $ aws_security_viz --region us-west-1 --target-filter=sec-group-1
144
+ ```
145
+
146
+ #### Generate visualization for `us-west-1` restricted to vpc-id `vpc-12345`
147
+ ```
148
+ $ aws_security_viz --region us-west-1 --vpc-id=vpc-12345
149
+ ```
150
+
151
+ #### Generate visualization for `us-west-1` restricted to vpc-id `vpc-12345`
152
+ ```
153
+ $ aws_security_viz --region us-west-1 --vpc-id=vpc-12345
154
+ ```
data/Rakefile CHANGED
@@ -2,3 +2,14 @@ require 'bundler/gem_tasks'
2
2
  require 'rspec/core/rake_task'
3
3
 
4
4
  RSpec::Core::RakeTask.new(:spec)
5
+
6
+ namespace :docker do
7
+ task :login do
8
+ sh 'echo "$DOCKER_PASSWORD" | docker login -u "$DOCKER_USERNAME" --password-stdin'
9
+ end
10
+ desc "push to dockerhub"
11
+ task :push => :login do
12
+ sh 'docker build -t anay/aws-security-viz .'
13
+ sh 'docker push anay/aws-security-viz'
14
+ end
15
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws_security_viz
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.1.pre.alpha.pre.235
4
+ version: 0.2.1.pre.alpha.pre.261
5
5
  platform: ruby
6
6
  authors:
7
7
  - Anay Nayak
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2019-08-25 00:00:00.000000000 Z
11
+ date: 2019-10-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler
@@ -174,6 +174,7 @@ executables:
174
174
  extensions: []
175
175
  extra_rdoc_files: []
176
176
  files:
177
+ - ".editorconfig"
177
178
  - ".gitignore"
178
179
  - ".travis.yml"
179
180
  - CHANGELOG.md