This commit is contained in:
mgeeky 2019-03-25 14:40:06 +01:00
parent b33746fda3
commit 772d6ca768
1 changed files with 1 additions and 3 deletions

View File

@ -439,7 +439,7 @@ def parseOptions(argv):
required.add_argument('--access-key', type=str, help = 'AWS Access Key ID') required.add_argument('--access-key', type=str, help = 'AWS Access Key ID')
required.add_argument('--secret-key', type=str, help = 'AWS Access Key ID') required.add_argument('--secret-key', type=str, help = 'AWS Access Key ID')
required.add_argument('--token', type=str, help = 'AWS temporary session token') optional.add_argument('--token', type=str, help = 'AWS temporary session token')
optional.add_argument('trail_name', type=str, default = 'all', nargs='?', help = 'CloudTrail name that you want to disrupt. If not specified, will disrupt every actively logging trail.') optional.add_argument('trail_name', type=str, default = 'all', nargs='?', help = 'CloudTrail name that you want to disrupt. If not specified, will disrupt every actively logging trail.')
@ -527,8 +527,6 @@ def main(argv):
for trail in trails: for trail in trails:
Logger._out(f'\t- {trail["Name"]}') Logger._out(f'\t- {trail["Name"]}')
sys.exit(0)
Logger._out('') Logger._out('')
Logger.info('Step 2: Create a role to be assumed by planted Lambda') Logger.info('Step 2: Create a role to be assumed by planted Lambda')
created_role = dis.create_role(config['role-name'], aws_policy_lambda_assume_role) created_role = dis.create_role(config['role-name'], aws_policy_lambda_assume_role)