aws40_import_account_standards_c2 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. #! /bin/bash
  2. #
  3. # Simple helper script to do the appropriate imports for the account_standards_c2 module.
  4. # Variables that don't change
  5. ACCOUNT_ID=$(cat ../account.hcl | egrep -v '^#' | egrep aws_account_id | awk '{ print $3 }' | sed 's/"//g')
  6. REGION=$(cat ../../region.hcl | egrep -v '^#' | egrep aws_region | awk '{ print $3 }' | sed 's/"//g')
  7. ENVIRONMENT=$(cat ../../../env.hcl | egrep -v '^#' | egrep "environment =" | awk '{ print $3 }' | sed 's/"//g')
  8. echo ""
  9. echo ----------------------------
  10. echo xdr-config-test-access-logs:
  11. TO_IMPORT=(
  12. module.xdr_config_logging_bucket.aws_s3_bucket_versioning.this
  13. module.xdr_config_logging_bucket.aws_s3_bucket_server_side_encryption_configuration.this
  14. module.xdr_config_logging_bucket.aws_s3_bucket_logging.this
  15. module.xdr_config_logging_bucket.aws_s3_bucket_lifecycle_configuration.this[0]
  16. module.xdr_config_logging_bucket.aws_s3_bucket_acl.log_bucket_acl
  17. )
  18. BUCKET_NAME=xdr-config-${ENVIRONMENT}-access-logs
  19. for i in ${TO_IMPORT[@]}; do
  20. if [[ $i =~ aws_s3_bucket_acl ]]; then
  21. EXTRA=",private"
  22. else
  23. EXTRA=""
  24. fi
  25. terragrunt import $i ${BUCKET_NAME}${EXTRA}
  26. done
  27. echo ""
  28. echo ----------------------------
  29. echo xdr-cloudtrail-logs-test-access-logs:
  30. TO_IMPORT=(
  31. module.s3_logging_bucket.aws_s3_bucket_versioning.this
  32. module.s3_logging_bucket.aws_s3_bucket_server_side_encryption_configuration.this
  33. module.s3_logging_bucket.aws_s3_bucket_logging.this
  34. module.s3_logging_bucket.aws_s3_bucket_lifecycle_configuration.this[0]
  35. module.s3_logging_bucket.aws_s3_bucket_acl.log_bucket_acl
  36. )
  37. BUCKET_NAME=xdr-cloudtrail-logs-${ENVIRONMENT}-access-logs
  38. for i in ${TO_IMPORT[@]}; do
  39. if [[ $i =~ aws_s3_bucket_acl ]]; then
  40. EXTRA=",private"
  41. else
  42. EXTRA=""
  43. fi
  44. terragrunt import $i ${BUCKET_NAME}${EXTRA}
  45. done
  46. echo ""
  47. echo ----------------------------
  48. echo xdr-elb-test-access-logs:
  49. TO_IMPORT=(
  50. module.elb_logging_logging_bucket.aws_s3_bucket_versioning.this
  51. module.elb_logging_logging_bucket.aws_s3_bucket_server_side_encryption_configuration.this
  52. module.elb_logging_logging_bucket.aws_s3_bucket_logging.this
  53. module.elb_logging_logging_bucket.aws_s3_bucket_lifecycle_configuration.this[0]
  54. module.elb_logging_logging_bucket.aws_s3_bucket_acl.log_bucket_acl
  55. )
  56. BUCKET_NAME=xdr-elb-${ENVIRONMENT}-access-logs
  57. for i in ${TO_IMPORT[@]}; do
  58. if [[ $i =~ aws_s3_bucket_acl ]]; then
  59. EXTRA=",private"
  60. else
  61. EXTRA=""
  62. fi
  63. terragrunt import $i ${BUCKET_NAME}${EXTRA}
  64. done
  65. echo ""
  66. echo ----------------------------
  67. echo xdr-cloudtrail-logs-test:
  68. TO_IMPORT=(
  69. module.cloudtrail_logging_bucket.aws_s3_bucket_versioning.this
  70. module.cloudtrail_logging_bucket.aws_s3_bucket_server_side_encryption_configuration.kinesis_firehose_s3_bucket
  71. module.cloudtrail_logging_bucket.aws_s3_bucket_logging.this
  72. module.cloudtrail_logging_bucket.aws_s3_bucket_lifecycle_configuration.this
  73. module.cloudtrail_logging_bucket.aws_s3_bucket_acl.this
  74. )
  75. BUCKET_NAME=xdr-cloudtrail-logs-${ENVIRONMENT}
  76. for i in ${TO_IMPORT[@]}; do
  77. if [[ $i =~ aws_s3_bucket_acl ]]; then
  78. EXTRA=",private"
  79. else
  80. EXTRA=""
  81. fi
  82. terragrunt import $i ${BUCKET_NAME}${EXTRA}
  83. done
  84. echo ""
  85. echo ----------------------------
  86. echo xdr-config-test:
  87. TO_IMPORT=(
  88. aws_s3_bucket_versioning.xdr_config_bucket
  89. aws_s3_bucket_server_side_encryption_configuration.xdr_config_bucket
  90. aws_s3_bucket_logging.xdr_config_bucket
  91. aws_s3_bucket_acl.xdr_config_bucket
  92. )
  93. BUCKET_NAME=xdr-config-${ENVIRONMENT}
  94. for i in ${TO_IMPORT[@]}; do
  95. if [[ $i =~ aws_s3_bucket_acl ]]; then
  96. EXTRA=",private"
  97. else
  98. EXTRA=""
  99. fi
  100. terragrunt import $i ${BUCKET_NAME}${EXTRA}
  101. done
  102. echo ""
  103. echo ----------------------------
  104. echo xdr-elb-test:
  105. TO_IMPORT=(
  106. aws_s3_bucket_logging.elb_logging_bucket
  107. aws_s3_bucket_versioning.s3_version_elb_logging_bucket
  108. aws_s3_bucket_server_side_encryption_configuration.s3_sse_elb_logging_bucket
  109. aws_s3_bucket_logging.elb_logging_bucket
  110. aws_s3_bucket_acl.s3_acl_elb_logging_bucket
  111. )
  112. BUCKET_NAME=xdr-elb-${ENVIRONMENT}
  113. for i in ${TO_IMPORT[@]}; do
  114. if [[ $i =~ aws_s3_bucket_acl ]]; then
  115. EXTRA=",private"
  116. else
  117. EXTRA=""
  118. fi
  119. terragrunt import $i ${BUCKET_NAME}${EXTRA}
  120. done