aws_security_viz 0.2.2.pre.alpha.pre.397 → 0.2.2.pre.alpha.pre.398

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +22 -6
  3. metadata +2 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a01dc1014a5930cf9443e21dbb4e73779bcbe4b37b43d4db17f9af236617e947
4
- data.tar.gz: 8927b542e228bb8edd72bf67ba10c9b4cdbd008f6ba8a3fbdabd3a7cc07bb308
3
+ metadata.gz: d74773df36cb3a6a3d2045bdedef77da3753874f7c7d328b052aba0d71338ac0
4
+ data.tar.gz: 709d4284ebcf564618652cb6734dca4c7a3adbbb5d1447caf6ccfbd2c8e1feb6
5
5
  SHA512:
6
- metadata.gz: 034e4a0f9a6ccef0960e11a490d4aba686037d7cfb590023beeb459638ba7bdadd2974f66cbacee472ce5543df7cb3cc5cb9f6b19fd6ea8d73741d63fdf0318c
7
- data.tar.gz: 6ff0105ece63da177484e2c62632b55eccf3aa8d33f7ee68e7598c41d67d93940decb60c2c8b040760afbe5da18610e7d41460b589ba82ce81985a1a7dca7982
6
+ metadata.gz: e7ce40fdddee3e97d3e7bb620e66273735cf73f712f349f21c547beb4441e2a02c8ba8a672662485d3d752d9ec63e66994ca71a0cfce5bd544fe4f6dccfe31d0
7
+ data.tar.gz: 376fefd96b96ad75998a5815555524626b5b953d9dba3c84896e023a35ed576ccc6f6edb7efb42db999eac8d13142fa0890524136a42d9ace0e0dd3a9df030a1
data/README.md CHANGED
@@ -51,16 +51,32 @@ To generate a web view
51
51
 
52
52
  ## DOCKER USAGE
53
53
 
54
-
55
- ## Cleanup + add Docker from off the shelf image
56
54
  If you don't want to install the dependencies and ruby libs you can execute aws-security-viz inside a docker container. To do so, follow these steps:
57
55
 
58
56
  1. Clone this repository, open it in a console.
59
57
  2. Build the docker container: `docker build -t sec-viz .`
60
- 3. Run the container: `docker run -i --rm -t -p 3000:3000 -v $(pwd)/aws-viz:/aws-security-viz --name sec-viz sec-viz` (Description: `-i` interactive shell, `--rm` remove the container after usage, `-t` attach this terminal to it, `-p 3000:3000` we expose port 3000 for the HTTP server, `-v $(pwd)/aws-viz:aws-security-viz` mount tmp directory for generated artifacts, `-name sec-viz` the container will have the same name as the image we will start)
61
- 4. Now you can use the tool as described in [usage](#USAGE). Make sure that you use the commands with `bundler exec ` as prefix. For example: `aws_security_viz -a your_aws_key -s your_aws_secret_key -f aws.json`.
62
- 5. To start the web view, execute `ruby -run -e httpd -- -p 3000` in the container. You can open it with your local browser at `http://0.0.0.0:3000/`. There you can view the generated images and the graph. Use `Ctrl+C` to close the HTTP server.
63
- 6. Terminate the docker container by typing `exit` in the console.
58
+
59
+ 3.a With aws-vault (Recommended):
60
+
61
+ ```aws-vault exec tldev -- docker run -i -e AWS_REGION -e AWS_ACCESS_KEY_ID -e AWS_SECRET_ACCESS_KEY -e AWS_SESSION_TOKEN -e AWS_SECURITY_TOKEN --rm -t -p 3000:3000 -v (pwd)/aws-viz:/aws-security-viz --name sec-viz sec-viz /usr/local/bundle/bin/aws_security_viz --renderer navigator --serve 3000``` .
62
+
63
+ You can open it with your local browser at `http://localhost:3000/navigator.html#aws-security-viz.png`.
64
+
65
+ 3.b With AWS credentials passed as parameters:
66
+
67
+ ```docker run -i --rm -t -p 3000:3000 -v (pwd)/aws-viz:/aws-security-viz --name sec-viz sec-viz /usr/local/bundle/bin/aws_security_viz -a REPLACE_AWS_ACCESS_KEY_ID -s REPLACE_SECRET --renderer navigator --serve 3000```.
68
+
69
+ You can open it with your local browser at `http://localhost:3000/navigator.html#aws-security-viz.png`.
70
+
71
+ Parameters passed to the docker command:
72
+ * `-v $(pwd)/aws-viz:aws-security-viz` local directory where output will be generated.
73
+ * `-i` interactive shell
74
+ * `--rm` remove the container after usage
75
+ * `-t` attach this terminal to it
76
+ * `-p 3000:3000` we expose port 3000 for the HTTP server
77
+ * `-name sec-viz` the container will have the same name as the image we will start
78
+
79
+ You can also use other parameters as specified in [usage](#USAGE)
64
80
 
65
81
  ### Help
66
82
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws_security_viz
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.2.pre.alpha.pre.397
4
+ version: 0.2.2.pre.alpha.pre.398
5
5
  platform: ruby
6
6
  authors:
7
7
  - Anay Nayak
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2020-08-04 00:00:00.000000000 Z
11
+ date: 2020-08-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler