PaloAltoNetworks / secops_ctf_scoreboard

Apache License 2.0
4 stars 2 forks source link

add python playbook #5

Closed devsecfranklin closed 4 years ago

github-actions[bot] commented 4 years ago

terraform fmt Failed

./aws/machines.tf ```diff } connection { - user = "ubuntu" - // timeout = "1m" - // #agent = false - // private_key = "${file("~/.ssh/id_rsa")}" + user = "ubuntu" + // timeout = "1m" + // #agent = false + // private_key = "${file("~/.ssh/id_rsa")}" } } ```

Workflow: Terraform GitHub Actions, Action: hashicorpterraform-github-actions1, Working Directory: ./aws, Workspace: default

github-actions[bot] commented 4 years ago

terraform fmt Failed

./aws/machines.tf ```diff } connection { - user = "ubuntu" - // timeout = "1m" - // #agent = false - // private_key = "${file("~/.ssh/id_rsa")}" + user = "ubuntu" + // timeout = "1m" + // #agent = false + // private_key = "${file("~/.ssh/id_rsa")}" } } ```

Workflow: Terraform GitHub Actions, Action: hashicorpterraform-github-actions1, Working Directory: ./aws, Workspace: default

github-actions[bot] commented 4 years ago

terraform fmt Failed

./aws/machines.tf ```diff } connection { - user = "ubuntu" - // timeout = "1m" - // #agent = false - // private_key = "${file("~/.ssh/id_rsa")}" + user = "ubuntu" + // timeout = "1m" + // #agent = false + // private_key = "${file("~/.ssh/id_rsa")}" } } ```

Workflow: Terraform GitHub Actions, Action: hashicorpterraform-github-actions1, Working Directory: ./aws, Workspace: default

github-actions[bot] commented 4 years ago

terraform fmt Failed

./aws/machines.tf ```diff } connection { - user = "ubuntu" + user = "ubuntu" } } ```

Workflow: Terraform GitHub Actions, Action: hashicorpterraform-github-actions1, Working Directory: ./aws, Workspace: default

github-actions[bot] commented 4 years ago

terraform plan Success

Show Output ``` An execution plan has been generated and is shown below. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # aws_instance.franklin-iac will be created + resource "aws_instance" "franklin-iac" { + ami = "ami-03c54f372e6caf1d3" + arn = (known after apply) + associate_public_ip_address = true + availability_zone = (known after apply) + cpu_core_count = (known after apply) + cpu_threads_per_core = (known after apply) + get_password_data = false + host_id = (known after apply) + id = (known after apply) + instance_state = (known after apply) + instance_type = "t2.micro" + ipv6_address_count = (known after apply) + ipv6_addresses = (known after apply) + key_name = "scoreboard" + network_interface_id = (known after apply) + password_data = (known after apply) + placement_group = (known after apply) + primary_network_interface_id = (known after apply) + private_dns = (known after apply) + private_ip = (known after apply) + public_dns = (known after apply) + public_ip = (known after apply) + security_groups = (known after apply) + source_dest_check = true + subnet_id = (known after apply) + tags = { + "Name" = "ubuntu-ctf-scoreboard" } + tenancy = (known after apply) + volume_tags = (known after apply) + vpc_security_group_ids = (known after apply) + ebs_block_device { + delete_on_termination = (known after apply) + device_name = (known after apply) + encrypted = (known after apply) + iops = (known after apply) + kms_key_id = (known after apply) + snapshot_id = (known after apply) + volume_id = (known after apply) + volume_size = (known after apply) + volume_type = (known after apply) } + ephemeral_block_device { + device_name = (known after apply) + no_device = (known after apply) + virtual_name = (known after apply) } + metadata_options { + http_endpoint = (known after apply) + http_put_response_hop_limit = (known after apply) + http_tokens = (known after apply) } + network_interface { + delete_on_termination = (known after apply) + device_index = (known after apply) + network_interface_id = (known after apply) } + root_block_device { + delete_on_termination = true + encrypted = (known after apply) + iops = (known after apply) + kms_key_id = (known after apply) + volume_id = (known after apply) + volume_size = 10 + volume_type = "standard" } } # aws_internet_gateway.default will be created + resource "aws_internet_gateway" "default" { + id = (known after apply) + owner_id = (known after apply) + vpc_id = (known after apply) } # aws_key_pair.id_rsa will be created + resource "aws_key_pair" "id_rsa" { + fingerprint = (known after apply) + id = (known after apply) + key_name = "scoreboard" + key_pair_id = (known after apply) + public_key = "ssh-rsa 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 thedevilsvoice@protonmail.ch" } # aws_route.internet_access will be created + resource "aws_route" "internet_access" { + destination_cidr_block = "0.0.0.0/0" + destination_prefix_list_id = (known after apply) + egress_only_gateway_id = (known after apply) + gateway_id = (known after apply) + id = (known after apply) + instance_id = (known after apply) + instance_owner_id = (known after apply) + nat_gateway_id = (known after apply) + network_interface_id = (known after apply) + origin = (known after apply) + route_table_id = (known after apply) + state = (known after apply) } # aws_route_table_association.a will be created + resource "aws_route_table_association" "a" { + id = (known after apply) + route_table_id = (known after apply) + subnet_id = (known after apply) } # aws_security_group.iac_sec_grp will be created + resource "aws_security_group" "iac_sec_grp" { + arn = (known after apply) + description = "Used in the terraform" + egress = [ + { + cidr_blocks = [ + "0.0.0.0/0", ] + description = "" + from_port = 0 + ipv6_cidr_blocks = [] + prefix_list_ids = [] + protocol = "-1" + security_groups = [] + self = false + to_port = 0 }, ] + id = (known after apply) + ingress = [ + { + cidr_blocks = [ + "0.0.0.0/0", ] + description = "" + from_port = 22 + ipv6_cidr_blocks = [] + prefix_list_ids = [] + protocol = "tcp" + security_groups = [] + self = false + to_port = 22 }, + { + cidr_blocks = [ + "0.0.0.0/0", ] + description = "" + from_port = 8000 + ipv6_cidr_blocks = [] + prefix_list_ids = [] + protocol = "tcp" + security_groups = [] + self = false + to_port = 8000 }, ] + name = "iac_sec_grp" + owner_id = (known after apply) + revoke_rules_on_delete = false + vpc_id = (known after apply) } # aws_subnet.franklin-iac will be created + resource "aws_subnet" "franklin-iac" { + arn = (known after apply) + assign_ipv6_address_on_creation = false + availability_zone = "us-west-2c" + availability_zone_id = (known after apply) + cidr_block = "10.0.1.0/24" + id = (known after apply) + ipv6_cidr_block = (known after apply) + ipv6_cidr_block_association_id = (known after apply) + map_public_ip_on_launch = true + owner_id = (known after apply) + vpc_id = (known after apply) } # aws_vpc.main will be created + resource "aws_vpc" "main" { + arn = (known after apply) + assign_generated_ipv6_cidr_block = false + cidr_block = "10.0.0.0/16" + default_network_acl_id = (known after apply) + default_route_table_id = (known after apply) + default_security_group_id = (known after apply) + dhcp_options_id = (known after apply) + enable_classiclink = (known after apply) + enable_classiclink_dns_support = (known after apply) + enable_dns_hostnames = (known after apply) + enable_dns_support = true + id = (known after apply) + instance_tenancy = "default" + ipv6_association_id = (known after apply) + ipv6_cidr_block = (known after apply) + main_route_table_id = (known after apply) + owner_id = (known after apply) } Plan: 8 to add, 0 to change, 0 to destroy. ```

Workflow: Terraform GitHub Actions, Action: hashicorpterraform-github-actions4, Working Directory: ./aws, Workspace: default