From cca0cb5307ca625b9688e378fbd669ed977ab763 Mon Sep 17 00:00:00 2001 From: Andrew <61951628+andrew-aiken@users.noreply.github.com> Date: Thu, 4 Jan 2024 15:13:31 -0500 Subject: [PATCH] Refactor/cloud breach s3 (#214) * Fixes #198 --- .github/pull_request_template.md | 5 + .../cloud_breach_s3/terraform/data_sources.tf | 8 +- scenarios/cloud_breach_s3/terraform/ec2.tf | 191 +++++++++--------- scenarios/cloud_breach_s3/terraform/locals.tf | 15 ++ .../cloud_breach_s3/terraform/outputs.tf | 8 +- .../cloud_breach_s3/terraform/provider.tf | 6 +- scenarios/cloud_breach_s3/terraform/s3.tf | 74 ++----- .../cloud_breach_s3/terraform/variables.tf | 39 +++- .../cloud_breach_s3/terraform/versions.tf | 10 + scenarios/cloud_breach_s3/terraform/vpc.tf | 80 ++++---- 10 files changed, 224 insertions(+), 212 deletions(-) create mode 100644 .github/pull_request_template.md create mode 100644 scenarios/cloud_breach_s3/terraform/locals.tf create mode 100644 scenarios/cloud_breach_s3/terraform/versions.tf diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md new file mode 100644 index 00000000..bd3b4675 --- /dev/null +++ b/.github/pull_request_template.md @@ -0,0 +1,5 @@ +#### Overview of Changes +- What was changed + +#### Testing +Was this tested with different Terraform versions? diff --git a/scenarios/cloud_breach_s3/terraform/data_sources.tf b/scenarios/cloud_breach_s3/terraform/data_sources.tf index e06e5681..0c69f6f7 100644 --- a/scenarios/cloud_breach_s3/terraform/data_sources.tf +++ b/scenarios/cloud_breach_s3/terraform/data_sources.tf @@ -1,8 +1,2 @@ #AWS Account Id -data "aws_caller_identity" "aws-account-id" { - -} -#S3 Full Access Policy -data "aws_iam_policy" "s3-full-access" { - arn = "arn:aws:iam::aws:policy/AmazonS3FullAccess" -} \ No newline at end of file +data "aws_caller_identity" "aws-account-id" {} diff --git a/scenarios/cloud_breach_s3/terraform/ec2.tf b/scenarios/cloud_breach_s3/terraform/ec2.tf index b064fa52..b8dfacf5 100644 --- a/scenarios/cloud_breach_s3/terraform/ec2.tf +++ b/scenarios/cloud_breach_s3/terraform/ec2.tf @@ -1,122 +1,129 @@ #IAM Role resource "aws_iam_role" "cg-banking-WAF-Role" { name = "cg-banking-WAF-Role-${var.cgid}" - assume_role_policy = <