A bunch of vulnerable S3 buckets managed by Terraform
Name | Version |
---|---|
terraform | ~> 1.0 |
aws | ~> 5.0 |
Name | Version |
---|---|
aws | 5.66.0 |
No modules.
Name | Type |
---|---|
aws_s3_bucket.example | resource |
aws_s3_bucket_ownership_controls.example | resource |
aws_s3_bucket_policy.allow_this_account_admins | resource |
aws_s3_bucket_public_access_block.public_access_block | resource |
aws_caller_identity.current | data source |
aws_iam_policy_document.this_accounts_admins | data source |
aws_iam_roles.admins | data source |
Name | Description | Type | Default | Required |
---|---|---|---|---|
admin_iam_role_regex | A regex to match IAM roles that will have r/w permission on the s3 bucket | string |
`"(AWSReservedSSO_AWSAdministratorAccess_ | github_actions_admin).*"` |
aws_profile | The awscli profile to use when configuring the AWS provider | string |
"personal" |
no |
aws_region | The region to use when configuring the AWS provider | string |
"us-east-1" |
no |
bucket_name | The s3 bucket name | string |
n/a | yes |
owner | This project's owner, which will be added as a tag to resources | string |
"Jack Cusick" |
no |
No outputs.