Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
31 changes: 31 additions & 0 deletions aws/policy/application-services.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,8 @@ Statement:
- events:PutTargets
- events:RemoveTargets
- glue:Get*
- medialive:Describe*
- medialive:List*
- kinesis:Describe*
- kinesis:List*
- mq:Describe*
Expand Down Expand Up @@ -62,6 +64,7 @@ Statement:
- sqs:TagQueue
- sqs:UntagQueue
- ssm:AddTagsToResource
- ssm:CreateActivation
- ssm:Describe*
- ssm:Get*
- ssm:List*
Expand Down Expand Up @@ -117,6 +120,32 @@ Statement:
- kinesis:RemoveTagsFromStream
- kinesis:StartStreamEncryption
- kinesis:StopStreamEncryption
- medialive:CreateChannel
- medialive:CreateChannelPlacementGroup
- medialive:CreateCluster
- medialive:CreateInput
- medialive:CreateInputSecurityGroup
- medialive:CreateNetwork
- medialive:CreateNode
- medialive:CreateNodeRegistrationScript
- medialive:CreateSdiSource
- medialive:CreateTags
- medialive:DeleteChannel
- medialive:DeleteChannelPlacementGroup
- medialive:DeleteCluster
- medialive:DeleteInput
- medialive:DeleteInputSecurityGroup
- medialive:DeleteNetwork
- medialive:DeleteNode
- medialive:DeleteSdiSource
- medialive:StartChannel
- medialive:StopChannel
- medialive:TagResource
- medialive:UntagResource
- medialive:UpdateChannel
- medialive:UpdateInput
- medialive:UpdateInputSecurityGroup
- medialive:UpdateSdiSource
- mq:CreateTags
- SNS:CreateTopic
- SNS:DeleteTopic
Expand All @@ -141,6 +170,8 @@ Statement:
- 'arn:aws:glue:{{ aws_region }}:{{ aws_account_id }}:crawler/*'
- 'arn:aws:glue:{{ aws_region }}:{{ aws_account_id }}:job/*'
- 'arn:aws:kinesis:{{ aws_region }}:{{ aws_account_id }}:stream/*'
- 'arn:aws:medialive:{{ aws_region }}:{{ aws_account_id }}:*'
- 'arn:aws:medialive:{{ aws_region }}:{{ aws_account_id }}:input:*'
- 'arn:aws:mq:{{ aws_region }}:{{ aws_account_id }}:*'
- 'arn:aws:sns:{{ aws_region }}:{{ aws_account_id }}:*'
- 'arn:aws:ssm:{{ aws_region }}:{{ aws_account_id }}:parameter/*'
Expand Down
24 changes: 11 additions & 13 deletions aws/policy/security-services.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,11 +14,7 @@ Statement:
ArnLike:
iam:PolicyArn:
- 'arn:aws:iam::aws:policy/AWSDenyAll'
- 'arn:aws:iam::aws:policy/AmazonEKSServicePolicy'
- 'arn:aws:iam::aws:policy/AmazonEKSClusterPolicy'
- 'arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy'
- 'arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy'
- 'arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy'
- 'arn:aws:iam::aws:policy/AmazonEKS*'
- 'arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly'
- 'arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess'
- 'arn:aws:iam::aws:policy/IAMReadOnlyAccess'
Expand All @@ -32,10 +28,11 @@ Statement:
- 'arn:aws:iam::aws:policy/service-role/AmazonRDSEnhancedMonitoringRole'
- 'arn:aws:iam::aws:policy/service-role/AWSServiceRoleForVPCTransitGateway'
- 'arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy'
- 'arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForBackup'
- 'arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForRestores'
- 'arn:aws:iam::aws:policy/AWSBackupServiceRolePolicyForS3Backup'
- 'arn:aws:iam::aws:policy/AWSBackupServiceRolePolicyForS3Restore'
- 'arn:aws:iam::aws:policy/*BackupService*'
- 'arn:aws:iam::aws:policy/CloudWatchFullAccessV2'
- 'arn:aws:iam::aws:policy/AWSElementalMediaLiveFullAccess'
- 'arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceforEC2Role'
- 'arn:aws:iam::{{ aws_account_id }}:policy/ansible-test-*'

- Sid: AllowRegionalUnrestrictedResourceActionsWhichIncurNoFees
Effect: Allow
Expand Down Expand Up @@ -65,10 +62,11 @@ Statement:
Effect: Allow
Action:
- access-analyzer:ValidatePolicy
- iam:GetRole
- iam:Get*
- iam:List*
- iam:Tag*
- iam:Untag*
- sts:GetCallerIdentity
- kms:CreateAlias
- kms:CreateGrant
- kms:DeleteAlias
Expand Down Expand Up @@ -124,14 +122,13 @@ Statement:
- acm:RequestCertificate
- iam:AddRoleToInstanceProfile
- iam:CreateInstanceProfile
- iam:CreatePolicy
- iam:CreateRole
- iam:CreateSAMLProvider
- iam:DeleteInstanceProfile
- iam:DeleteRole
- iam:DeleteSAMLProvider
- iam:GetInstanceProfile
- iam:GetSAMLProvider
- iam:GetServerCertificate
- iam:Get*
- iam:PassRole
- iam:RemoveRoleFromInstanceProfile
- iam:UpdateSAMLProvider
Expand All @@ -154,6 +151,7 @@ Statement:
- 'arn:aws:iam::{{ aws_account_id }}:saml-provider/ansible-test-*'
- 'arn:aws:iam::{{ aws_account_id }}:server-certificate/ansible-test-*'
- 'arn:aws:iam::{{ aws_account_id }}:role/ansible-test-*'
- 'arn:aws:iam::{{ aws_account_id }}:policy/ansible-test-*'
# dms-vpc-role is hard coded into DMS...
- 'arn:aws:iam::{{ aws_account_id }}:role/dms-vpc-role'
- 'arn:aws:iam::{{ aws_account_id }}:role/rds_export_task'
Expand Down
210 changes: 210 additions & 0 deletions aws/terminator/application_services.py
Original file line number Diff line number Diff line change
Expand Up @@ -419,3 +419,213 @@ def id(self):

def terminate(self):
self.client.delete_broker(BrokerId=self.id)


class MediaLiveChannel(Terminator):
@staticmethod
def create(credentials):
def get_medialive_channels(client):
channels = client.list_channels()['Channels']
return channels

return Terminator._create(credentials, MediaLiveChannel, 'medialive', get_medialive_channels)

@property
def created_time(self):
return self.instance['CreatedAt']

@property
def name(self):
return self.instance['Name']

@property
def id(self):
return self.instance['Id']

@property
def ignore(self):
return self.instance['State'] == 'DELETING'

def terminate(self):
# Stop the channel if it's running before deleting
if self.instance['State'] == 'RUNNING':
self.client.stop_channel(ChannelId=self.id)
# Wait for the channel to stop
waiter = self.client.get_waiter('channel_stopped')
waiter.wait(ChannelId=self.id)
self.client.delete_channel(ChannelId=self.id)


class MediaLiveInput(Terminator):
@staticmethod
def create(credentials):
def get_medialive_inputs(client):
inputs = client.list_inputs()['Inputs']
return inputs

return Terminator._create(credentials, MediaLiveInput, 'medialive', get_medialive_inputs)

@property
def created_time(self):
return self.instance['CreatedAt']

@property
def name(self):
return self.instance['Name']

@property
def id(self):
return self.instance['Id']

def terminate(self):
self.client.delete_input(InputId=self.id)


class MediaLiveInputSecurityGroup(Terminator):
@staticmethod
def create(credentials):
def get_medialive_input_security_groups(client):
security_groups = client.list_input_security_groups()['InputSecurityGroups']
return security_groups

return Terminator._create(credentials, MediaLiveInputSecurityGroup, 'medialive', get_medialive_input_security_groups)

@property
def created_time(self):
return self.instance['CreatedAt']

@property
def name(self):
return self.instance.get('Name', self.id)

@property
def id(self):
return self.instance['Id']

def terminate(self):
self.client.delete_input_security_group(InputSecurityGroupId=self.id)


class MediaLiveChannelPlacementGroup(Terminator):
@staticmethod
def create(credentials):
def get_medialive_channel_placement_groups(client):
groups = client.list_channel_placement_groups()['ChannelPlacementGroups']
return groups

return Terminator._create(credentials, MediaLiveChannelPlacementGroup, 'medialive', get_medialive_channel_placement_groups)

@property
def created_time(self):
return self.instance['CreatedAt']

@property
def name(self):
return self.instance.get('Name', self.id)

@property
def id(self):
return self.instance['Id']

def terminate(self):
self.client.delete_channel_placement_group(ChannelPlacementGroupId=self.id)


class MediaLiveCluster(Terminator):
@staticmethod
def create(credentials):
def get_medialive_clusters(client):
clusters = client.list_clusters()['Clusters']
return clusters

return Terminator._create(credentials, MediaLiveCluster, 'medialive', get_medialive_clusters)

@property
def created_time(self):
return self.instance['CreatedAt']

@property
def name(self):
return self.instance.get('Name', self.id)

@property
def id(self):
return self.instance['Id']

def terminate(self):
self.client.delete_cluster(ClusterId=self.id)


class MediaLiveNetwork(Terminator):
@staticmethod
def create(credentials):
def get_medialive_networks(client):
networks = client.list_networks()['Networks']
return networks

return Terminator._create(credentials, MediaLiveNetwork, 'medialive', get_medialive_networks)

@property
def created_time(self):
return self.instance['CreatedAt']

@property
def name(self):
return self.instance.get('Name', self.id)

@property
def id(self):
return self.instance['Id']

def terminate(self):
self.client.delete_network(NetworkId=self.id)


class MediaLiveNode(Terminator):
@staticmethod
def create(credentials):
def get_medialive_nodes(client):
nodes = client.list_nodes()['Nodes']
return nodes

return Terminator._create(credentials, MediaLiveNode, 'medialive', get_medialive_nodes)

@property
def created_time(self):
return self.instance['CreatedAt']

@property
def name(self):
return self.instance.get('Name', self.id)

@property
def id(self):
return self.instance['Id']

def terminate(self):
self.client.delete_node(NodeId=self.id)


class MediaLiveSdiSource(Terminator):
@staticmethod
def create(credentials):
def get_medialive_sdi_sources(client):
sources = client.list_sdi_sources()['SdiSources']
return sources

return Terminator._create(credentials, MediaLiveSdiSource, 'medialive', get_medialive_sdi_sources)

@property
def created_time(self):
return self.instance['CreatedAt']

@property
def name(self):
return self.instance.get('Name', self.id)

@property
def id(self):
return self.instance['Id']

def terminate(self):
self.client.delete_sdi_source(SdiSourceId=self.id)