From 772d6ca76816ca3186d32f3275748dc68611dfd2 Mon Sep 17 00:00:00 2001 From: mgeeky Date: Mon, 25 Mar 2019 14:40:06 +0100 Subject: [PATCH] Oops --- clouds/aws/disruptCloudTrailByS3Lambda.py | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/clouds/aws/disruptCloudTrailByS3Lambda.py b/clouds/aws/disruptCloudTrailByS3Lambda.py index ffab788..85b62e4 100755 --- a/clouds/aws/disruptCloudTrailByS3Lambda.py +++ b/clouds/aws/disruptCloudTrailByS3Lambda.py @@ -439,7 +439,7 @@ def parseOptions(argv): required.add_argument('--access-key', type=str, help = 'AWS Access Key ID') required.add_argument('--secret-key', type=str, help = 'AWS Access Key ID') - required.add_argument('--token', type=str, help = 'AWS temporary session token') + optional.add_argument('--token', type=str, help = 'AWS temporary session token') optional.add_argument('trail_name', type=str, default = 'all', nargs='?', help = 'CloudTrail name that you want to disrupt. If not specified, will disrupt every actively logging trail.') @@ -527,8 +527,6 @@ def main(argv): for trail in trails: Logger._out(f'\t- {trail["Name"]}') - sys.exit(0) - Logger._out('') Logger.info('Step 2: Create a role to be assumed by planted Lambda') created_role = dis.create_role(config['role-name'], aws_policy_lambda_assume_role)