s3-secure 0.6.0 → 0.7.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +6 -0
- data/lib/s3_secure/access_logs/enable.rb +11 -0
- data/lib/s3_secure/backwards_compatibility.rb +20 -0
- data/lib/s3_secure/policy/document/base.rb +1 -1
- data/lib/s3_secure/policy/document/force_ssl_only_access.rb +1 -1
- data/lib/s3_secure/policy/document/force_ssl_only_access_remove.rb +1 -1
- data/lib/s3_secure/public_access/block.rb +1 -1
- data/lib/s3_secure/public_access/list.rb +1 -1
- data/lib/s3_secure/public_access/show.rb +2 -2
- data/lib/s3_secure/public_access/unblock.rb +1 -1
- data/lib/s3_secure/version.rb +1 -1
- data/lib/s3_secure.rb +2 -0
- metadata +4 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 0e15a47d29daa735b3711252366efd5098a37deb8a462890247bc02e1a5142a5
|
4
|
+
data.tar.gz: d0e54444d2e786683ac9c04616df08b3ec967d1f6ae12a8623f9a1ae10161446
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 02773d9b0dec9ac2a707c00006419b0e454e29d8f56bf8752c2306481c9ac93f1ed8b07a24fdbeba0b8280b0b00c968636c6cfaa5e4db68237f6c7889434abcb
|
7
|
+
data.tar.gz: 6f83926d4bfe6ea06620e7901e13492770246ed31bfb1bb119f62546d20038e4576ce26997111dfc3539294cc34fdd2952aef8b90d7ba3d5314780c83c2b4b0d
|
data/CHANGELOG.md
CHANGED
@@ -3,6 +3,12 @@
|
|
3
3
|
All notable changes to this project will be documented in this file.
|
4
4
|
This project *tries* to adhere to [Semantic Versioning](http://semver.org/), even before v1.0.
|
5
5
|
|
6
|
+
## [0.7.0] - 2023-07-11
|
7
|
+
- [#8](https://github.com/tongueroo/s3-secure/pull/8) fix s3.put_bucket_acl with s3.put_bucket_ownership_controls
|
8
|
+
|
9
|
+
## [0.6.1] - 2021-12-30
|
10
|
+
- [#6](https://github.com/tongueroo/s3-secure/pull/6) maintain backward compatibility terraspace_plugin_aws
|
11
|
+
|
6
12
|
## [0.6.0] - 2021-12-30
|
7
13
|
- [#4](https://github.com/tongueroo/s3-secure/pull/4) refactor move directly related cli classes to subfolder
|
8
14
|
- [#5](https://github.com/tongueroo/s3-secure/pull/5) add public access block support
|
@@ -13,6 +13,17 @@ module S3Secure::AccessLogs
|
|
13
13
|
return
|
14
14
|
end
|
15
15
|
|
16
|
+
# require to add in order to use put_bucket_acl since this change
|
17
|
+
# https://aws.amazon.com/blogs/aws/amazon-s3-block-public-access-another-layer-of-protection-for-your-accounts-and-buckets/
|
18
|
+
s3.put_bucket_ownership_controls(
|
19
|
+
bucket: @bucket,
|
20
|
+
ownership_controls: { # required
|
21
|
+
rules: [ # required
|
22
|
+
{object_ownership: "ObjectWriter"}, # required, accepts BucketOwnerPreferred, ObjectWriter, BucketOwnerEnforced
|
23
|
+
],
|
24
|
+
},
|
25
|
+
)
|
26
|
+
|
16
27
|
s3.put_bucket_acl(
|
17
28
|
bucket: @bucket,
|
18
29
|
access_control_policy: @show.access_control_policy_with_log_delivery_permissions,
|
@@ -0,0 +1,20 @@
|
|
1
|
+
module S3Secure
|
2
|
+
module BackwardsCompatibility
|
3
|
+
end
|
4
|
+
|
5
|
+
module Encryption
|
6
|
+
CLI::Encryption::Enable = Encryption::Enable
|
7
|
+
end
|
8
|
+
module Policy
|
9
|
+
CLI::Policy::Enforce = Policy::Enforce
|
10
|
+
end
|
11
|
+
module Versioning
|
12
|
+
CLI::Versioning::Enable = Versioning::Enable
|
13
|
+
end
|
14
|
+
module Lifecycle
|
15
|
+
CLI::Lifecycle::Add = Lifecycle::Add
|
16
|
+
end
|
17
|
+
module AccessLogs
|
18
|
+
CLI::AccessLogs::Enable = AccessLogs::Enable
|
19
|
+
end
|
20
|
+
end
|
@@ -5,7 +5,7 @@ module S3Secure::PublicAccess
|
|
5
5
|
presenter.header = ["Bucket", "Block Public Access?"]
|
6
6
|
|
7
7
|
buckets.each do |bucket|
|
8
|
-
|
8
|
+
say "Getting bucket public access configuration for bucket #{bucket.color(:green)}"
|
9
9
|
|
10
10
|
blocked = Show.new(bucket: bucket).blocked?
|
11
11
|
row = [bucket, blocked]
|
@@ -4,10 +4,10 @@ module S3Secure::PublicAccess
|
|
4
4
|
resp = s3.get_public_access_block(
|
5
5
|
bucket: @bucket,
|
6
6
|
)
|
7
|
-
|
7
|
+
say(resp.to_h)
|
8
8
|
resp
|
9
9
|
rescue Aws::S3::Errors::NoSuchPublicAccessBlockConfiguration
|
10
|
-
|
10
|
+
say "No public access block configuration found for bucket: #{@bucket}"
|
11
11
|
end
|
12
12
|
|
13
13
|
def blocked?
|
@@ -4,7 +4,7 @@ module S3Secure::PublicAccess
|
|
4
4
|
resp = s3.delete_public_access_block(
|
5
5
|
bucket: @bucket,
|
6
6
|
)
|
7
|
-
|
7
|
+
say("Removed public access block configuration for bucket: #{@bucket}")
|
8
8
|
resp
|
9
9
|
end
|
10
10
|
end
|
data/lib/s3_secure/version.rb
CHANGED
data/lib/s3_secure.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: s3-secure
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.7.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Tung Nguyen
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2023-07-11 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: activesupport
|
@@ -233,6 +233,7 @@ files:
|
|
233
233
|
- lib/s3_secure/autoloader.rb
|
234
234
|
- lib/s3_secure/aws_services.rb
|
235
235
|
- lib/s3_secure/aws_services/s3.rb
|
236
|
+
- lib/s3_secure/backwards_compatibility.rb
|
236
237
|
- lib/s3_secure/cli.rb
|
237
238
|
- lib/s3_secure/cli/access_logs.rb
|
238
239
|
- lib/s3_secure/cli/base.rb
|
@@ -325,7 +326,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
325
326
|
- !ruby/object:Gem::Version
|
326
327
|
version: '0'
|
327
328
|
requirements: []
|
328
|
-
rubygems_version: 3.
|
329
|
+
rubygems_version: 3.4.10
|
329
330
|
signing_key:
|
330
331
|
specification_version: 4
|
331
332
|
summary: S3 Bucket security hardening tool
|