aws_security_viz 0.2.1.pre.alpha.pre.235 → 0.2.1.pre.alpha.pre.261

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (8) hide show
  1. checksums.yaml +4 -4
  2. data/.editorconfig +17 -0
  3. data/.gitignore +9 -0
  4. data/.travis.yml +14 -6
  5. data/Dockerfile +1 -1
  6. data/README.md +29 -3
  7. data/Rakefile +11 -0
  8. metadata +3 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1ba0f2056be4cce36f83ec4b56f37187f3a6c7bc2f6e58484fc6079644a4f09e
4
- data.tar.gz: b02f5ccd754c2276bdb61923edb982c52973cc24a98300703f63f940456d0955
3
+ metadata.gz: f622815ba33c8b92e41b01ac92c796a46739ab6dbe2a91f434a9827e165c6133
4
+ data.tar.gz: 37178e26942e1a899d6cb2728885f4814beefa6ab0d5f0204793530dc5738a5e
5
5
  SHA512:
6
- metadata.gz: 2b7dbbde56bdd7029c13e2758afac897dd9e13252c7f2cb04d73a2f0a58493fb50c932458a967529f38f96355786600726be0c2065ad2b6f1ea9547cb2ee4419
7
- data.tar.gz: 30cbb460f829e0e0a0bcde3b15b29b38721abaaed0b803f733ffaeb31064d1a7b0ba047e516be4b4416a7758404d8742b97e261b0330e1614c18d2e0a1bad738
6
+ metadata.gz: 1e235bce6eeae78fa43d09b8e1d526748ecd34fdfd35a2fc83e6651150d1f2e163496b613a1d627a18cd08f3e3ecbe639f150094dff8720c08724486f1eff5f7
7
+ data.tar.gz: 6fc470b34b6c1e21a8fdb7d1a26cd8db6f847767232c2099fb6d22df79a19518e4299e15a091386568d12c375cea955e300a06b8a90effb9b57d85ab0410ddc2
@@ -0,0 +1,17 @@
1
+ root = true
2
+
3
+ [*]
4
+ end_of_line = lf
5
+ insert_final_newline = true
6
+
7
+ [*.rb]
8
+ charset = utf-8
9
+ indent_style = space
10
+ indent_size = 2
11
+
12
+ [Makefile]
13
+ indent_style = tab
14
+
15
+ [.travis.yml]
16
+ indent_style = space
17
+ indent_size = 2
data/.gitignore CHANGED
@@ -32,3 +32,12 @@ opts.yml
32
32
 
33
33
  .vagrant
34
34
  Gemfile.lock
35
+
36
+ # in case you run the sample commands in this directory..
37
+ viz.svg
38
+ aws.json
39
+ navigator.html
40
+ *.png
41
+ *.dot
42
+ *.svg
43
+ .DS_Store
@@ -27,10 +27,18 @@ cache: bundler
27
27
 
28
28
  sudo: false
29
29
 
30
+ services:
31
+ - docker
32
+
30
33
  deploy:
31
- provider: rubygems
32
- api_key:
33
- secure: FolEBkQI4oiqjZMzuZ/ELSJFxwCrUTmVhew+tr8yrDONOgphjvbOkDFMdPKnM48nMBekz0lS/yh6Ib5JXe0gxk6+fUq/37eNVF7eFc9poTJhJ2I6zkYOunxSTDInLy/Hxl90RXjKNnL+PFNPPZjLSXrUWeUxLViI00Dkfa9iT6s=
34
- gem: aws_security_viz
35
- on:
36
- repo: anaynayak/aws-security-viz
34
+ - provider: rubygems
35
+ api_key:
36
+ secure: YCC4KmUL1dzcpNq2QzZGl+favvFqfX5o2q1zcxIhmMCi53kxjjy7cjYw8xWacDtKKiS0dVDdZ6PckxoIK97qlMpBRupxvhvLUOAAhYfumuIr4tGP5vptaXG3hGKgc39wIs7tlbc8JWEehsZ2kBTE9nms4+Fu9e8+WGslN70OUFw=
37
+ gem: aws_security_viz
38
+ on:
39
+ repo: anaynayak/aws-security-viz
40
+ branch: master
41
+ - provider: script
42
+ script: rake docker:push
43
+ on:
44
+ branch: master
data/Dockerfile CHANGED
@@ -2,4 +2,4 @@ FROM ruby:2.6-alpine
2
2
  RUN apk add --update graphviz ttf-ubuntu-font-family
3
3
  RUN gem install aws_security_viz --pre
4
4
  WORKDIR /aws-security-viz
5
- ENTRYPOINT ["/bin/sh"]
5
+ CMD ["aws_security_viz"]
data/README.md CHANGED
@@ -23,9 +23,9 @@ aws-security-viz -- A tool to visualize aws security groups
23
23
 
24
24
  ## DEPENDENCIES
25
25
 
26
- * graphviz with triangulation `brew install graphviz --with-gts`
26
+ * graphviz `brew install graphviz`
27
27
 
28
- ## USAGE
28
+ ## USAGE (See Examples section below for more)
29
29
 
30
30
  To generate the graph directly using AWS keys
31
31
 
@@ -51,6 +51,8 @@ To generate a web view
51
51
 
52
52
  ## DOCKER USAGE
53
53
 
54
+
55
+ ## Cleanup + add Docker from off the shelf image
54
56
  If you don't want to install the dependencies and ruby libs you can execute aws-security-viz inside a docker container. To do so, follow these steps:
55
57
 
56
58
  1. Clone this repository, open it in a console.
@@ -112,13 +114,14 @@ Execute the following command to generate the json. You will need [aws-cli](http
112
114
 
113
115
  `aws ec2 describe-security-groups`
114
116
 
117
+
115
118
  ## EXAMPLES
116
119
 
117
120
  #### Graphviz export
118
121
 
119
122
  ![](https://github.com/anaynayak/aws-security-viz/raw/master/images/sample.png)
120
123
 
121
- #### Navigator view
124
+ #### Navigator view (useful with very large number of nodes)
122
125
  Via navigator renderer `aws_security_viz -a your_aws_key -s your_aws_secret_key -f aws.json --renderer navigator`
123
126
  ![](https://user-images.githubusercontent.com/416211/51426583-bb5e0180-1c12-11e9-903b-7b2a2d354ede.png)
124
127
 
@@ -126,3 +129,26 @@ Via navigator renderer `aws_security_viz -a your_aws_key -s your_aws_secret_key
126
129
  Via json renderer `aws_security_viz -a your_aws_key -s your_aws_secret_key -f aws.json --renderer json`
127
130
  ![](https://cloud.githubusercontent.com/assets/416211/11912582/0e66cdbc-a669-11e5-82ab-1e26e3c6949b.png)
128
131
 
132
+ ## Additional examples
133
+
134
+ #### Generate `aws-security-viz.png` image for `us-west-1` region
135
+
136
+ ```
137
+ $ aws_security_viz --region us-west-1 -f aws-security-viz.png
138
+ ```
139
+
140
+ #### Generate visualization for `us-west-1` with target filter as `sec-group-1`. This will display all routes through which we can arrive at `sec-group-1`
141
+
142
+ ```
143
+ $ aws_security_viz --region us-west-1 --target-filter=sec-group-1
144
+ ```
145
+
146
+ #### Generate visualization for `us-west-1` restricted to vpc-id `vpc-12345`
147
+ ```
148
+ $ aws_security_viz --region us-west-1 --vpc-id=vpc-12345
149
+ ```
150
+
151
+ #### Generate visualization for `us-west-1` restricted to vpc-id `vpc-12345`
152
+ ```
153
+ $ aws_security_viz --region us-west-1 --vpc-id=vpc-12345
154
+ ```
data/Rakefile CHANGED
@@ -2,3 +2,14 @@ require 'bundler/gem_tasks'
2
2
  require 'rspec/core/rake_task'
3
3
 
4
4
  RSpec::Core::RakeTask.new(:spec)
5
+
6
+ namespace :docker do
7
+ task :login do
8
+ sh 'echo "$DOCKER_PASSWORD" | docker login -u "$DOCKER_USERNAME" --password-stdin'
9
+ end
10
+ desc "push to dockerhub"
11
+ task :push => :login do
12
+ sh 'docker build -t anay/aws-security-viz .'
13
+ sh 'docker push anay/aws-security-viz'
14
+ end
15
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws_security_viz
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.1.pre.alpha.pre.235
4
+ version: 0.2.1.pre.alpha.pre.261
5
5
  platform: ruby
6
6
  authors:
7
7
  - Anay Nayak
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2019-08-25 00:00:00.000000000 Z
11
+ date: 2019-10-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler
@@ -174,6 +174,7 @@ executables:
174
174
  extensions: []
175
175
  extra_rdoc_files: []
176
176
  files:
177
+ - ".editorconfig"
177
178
  - ".gitignore"
178
179
  - ".travis.yml"
179
180
  - CHANGELOG.md