Skip to content
This repository was archived by the owner on Jan 24, 2025. It is now read-only.

Commit 199c78d

Browse files
committed
Refactor AWS environment configuration variables
1 parent e290b1a commit 199c78d

File tree

10 files changed

+40
-40
lines changed

10 files changed

+40
-40
lines changed

.github/workflows/prep/setup-aws-environment.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,15 +37,15 @@ jobs:
3737
- name: Configure Corporate AWS Credentials
3838
uses: aws-actions/configure-aws-credentials@v2
3939
with:
40-
aws-access-key-id: ${{ secrets.DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID }}
41-
aws-secret-access-key: ${{ secrets.DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY }}
40+
aws-access-key-id: ${{ secrets.DEVOPS_CORP_AWS_ACCESS_KEY_ID }}
41+
aws-secret-access-key: ${{ secrets.DEVOPS_CORP_AWS_SECRET_ACCESS_KEY }}
4242
aws-region: ${{ inputs.corp-aws-region }}
4343

4444
- name: Configure Federal AWS Credentials
4545
uses: aws-actions/configure-aws-credentials@v2
4646
with:
47-
aws-access-key-id: ${{ secrets.DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID }}
48-
aws-secret-access-key: ${{ secrets.DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY }}
47+
aws-access-key-id: ${{ secrets.DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID }}
48+
aws-secret-access-key: ${{ secrets.DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY }}
4949
aws-region: ${{ inputs.federal-aws-region }}
5050

5151
- name: Checkout repository

services/tools/aws/Access Control/replay_resistant_auth_evidence.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@
99
# Setup environments dictionary with AWS credentials and output file paths
1010
environments = {
1111
'private-sector': {
12-
'access_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID'),
13-
'secret_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
12+
'access_key': os.getenv('DEVOPS_CORP_AWS_ACCESS_KEY_ID'),
13+
'secret_key': os.getenv('DEVOPS_CORP_AWS_SECRET_ACCESS_KEY'),
1414
'region': 'us-east-1',
1515
'private_sector_output_file': f"/evidence-artifacts/{current_year}/private-sector/replay_resistant_auth.json"
1616
},
1717
'federal': {
18-
'access_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID'),
19-
'secret_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
18+
'access_key': os.getenv('DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID'),
19+
'secret_key': os.getenv('DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY'),
2020
'region': 'us-east-1',
2121
'federal_output_file': f"/evidence-artifacts/{current_year}/federal/replay_resistant_auth.json"
2222
}

services/tools/aws/Access Control/sso_enforcement_for_application_accounts.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@
77

88
environments = {
99
'private-sector': {
10-
'access_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID'),
11-
'secret_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
10+
'access_key': os.getenv('DEVOPS_CORP_AWS_ACCESS_KEY_ID'),
11+
'secret_key': os.getenv('DEVOPS_CORP_AWS_SECRET_ACCESS_KEY'),
1212
'region': 'us-east-1',
1313
'private_sector_output_file': f"/evidence-artifacts/{current_year}/private-sector/sso_enforcement_for_application_accounts.json"
1414
},
1515
'federal': {
16-
'access_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID'),
17-
'secret_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
16+
'access_key': os.getenv('DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID'),
17+
'secret_key': os.getenv('DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY'),
1818
'region': 'us-east-1',
1919
'federal_output_file': f"/evidence-artifacts/{current_year}/federal/sso_enforcement_for_application_accounts.json"
2020
}

services/tools/aws/Access Control/users_active_access_keys.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@
77

88
environments = {
99
'private-sector': {
10-
'access_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID'),
11-
'secret_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
10+
'access_key': os.getenv('DEVOPS_CORP_AWS_ACCESS_KEY_ID'),
11+
'secret_key': os.getenv('DEVOPS_CORP_AWS_SECRET_ACCESS_KEY'),
1212
'region': 'us-east-1',
1313
'private_sector_output_file': f"/evidence-artifacts/{current_year}/private-sector/users_active_access_keys.json"
1414
},
1515
'federal': {
16-
'access_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID'),
17-
'secret_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
16+
'access_key': os.getenv('DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID'),
17+
'secret_key': os.getenv('DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY'),
1818
'region': 'us-east-1',
1919
'federal_output_file': f"/evidence-artifacts/{current_year}/federal/users_active_access_keys.json"
2020
}

services/tools/aws/Access Control/users_configured_with_sso.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@
77

88
environments = {
99
'private-sector': {
10-
'access_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID'),
11-
'secret_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
10+
'access_key': os.getenv('DEVOPS_CORP_AWS_ACCESS_KEY_ID'),
11+
'secret_key': os.getenv('DEVOPS_CORP_AWS_SECRET_ACCESS_KEY'),
1212
'region': 'us-east-1',
1313
'private_sector_output_file': f"/evidence-artifacts/{current_year}/private-sector/users_configured_with_sso.json"
1414
},
1515
'federal': {
16-
'access_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID'),
17-
'secret_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
16+
'access_key': os.getenv('DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID'),
17+
'secret_key': os.getenv('DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY'),
1818
'region': 'us-east-1',
1919
'federal_output_file': f"/evidence-artifacts/{current_year}/federal/users_configured_with_sso.json"
2020
}

services/tools/aws/System and Communications Protection/verify_data_encryption_in_transit.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@
99
# Environment setup
1010
environments = {
1111
'private-sector': {
12-
'access_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID'),
13-
'secret_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
12+
'access_key': os.getenv('DEVOPS_CORP_AWS_ACCESS_KEY_ID'),
13+
'secret_key': os.getenv('DEVOPS_CORP_AWS_SECRET_ACCESS_KEY'),
1414
'region': 'us-east-1',
1515
'private_sector_output_file': f"/evidence-artifacts/{current_year}/private-sector/data_encryption_check.json"
1616
},
1717
'federal': {
18-
'access_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID'),
19-
'secret_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
18+
'access_key': os.getenv('DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID'),
19+
'secret_key': os.getenv('DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY'),
2020
'region': 'us-east-1',
2121
'federal_output_file': f"/evidence-artifacts/{current_year}/federal/data_encryption_check.json"
2222
}

services/tools/aws/System and Services Acquisition/source_code_vulnerability_scan_configuration.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@
99

1010
environments = {
1111
'private-sector': {
12-
'access_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID'),
13-
'secret_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
12+
'access_key': os.getenv('DEVOPS_CORP_AWS_ACCESS_KEY_ID'),
13+
'secret_key': os.getenv('DEVOPS_CORP_AWS_SECRET_ACCESS_KEY'),
1414
'region': 'us-east-1',
1515
'private_sector_output_file': f"/evidence-artifacts/{current_year}/private-sector/"
1616
},
1717
'federal': {
18-
'access_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID'),
19-
'secret_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
18+
'access_key': os.getenv('DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID'),
19+
'secret_key': os.getenv('DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY'),
2020
'region': 'us-east-1',
2121
'federal_output_file': f"/evidence-artifacts/{current_year}/federal/"
2222
}

services/tools/aws/System and Services Acquisition/source_code_vulnerability_scan_evidence.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,14 @@
1010
# Dictionary holding environments configuration
1111
environments = {
1212
'private-sector': {
13-
'access_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID'),
14-
'secret_key': os.getenv('DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
13+
'access_key': os.getenv('DEVOPS_CORP_AWS_ACCESS_KEY_ID'),
14+
'secret_key': os.getenv('DEVOPS_CORP_AWS_SECRET_ACCESS_KEY'),
1515
'region': 'us-east-1',
1616
'private_sector_output_file': f"/evidence-artifacts/{current_year}/private-sector/"
1717
},
1818
'federal': {
19-
'access_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID'),
20-
'secret_key': os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
19+
'access_key': os.getenv('DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID'),
20+
'secret_key': os.getenv('DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY'),
2121
'region': 'us-east-1',
2222
'federal_output_file': f"/evidence-artifacts/{current_year}/federal/"
2323
}

services/tools/aws/_config/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -203,12 +203,12 @@ The module defines configurations for two environments:
203203
#### Environment Details
204204

205205
- **private-sector**
206-
- Access Key: Retrieved from `DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID` environment variable.
207-
- Secret Key: Retrieved from `DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY` environment variable.
206+
- Access Key: Retrieved from `DEVOPS_CORP_AWS_ACCESS_KEY_ID` environment variable.
207+
- Secret Key: Retrieved from `DEVOPS_CORP_AWS_SECRET_ACCESS_KEY` environment variable.
208208
- Region: `us-east-1`
209209
- **federal**
210-
- Access Key: Retrieved from `DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID` environment variable.
211-
- Secret Key: Retrieved from `DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY` environment variable.
210+
- Access Key: Retrieved from `DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID` environment variable.
211+
- Secret Key: Retrieved from `DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY` environment variable.
212212
- Region: `us-east-1`
213213

214214

services/tools/aws/_config/config.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ def set_aws_credentials(self):
1717

1818
environments = {
1919
'private-sector': EnvironmentConfig(
20-
access_key=os.getenv('DEVOPS_CORP_AUTOMATION_AWS_ACCESS_KEY_ID'),
21-
secret_key=os.getenv('DEVOPS_CORP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
20+
access_key=os.getenv('DEVOPS_CORP_AWS_ACCESS_KEY_ID'),
21+
secret_key=os.getenv('DEVOPS_CORP_AWS_SECRET_ACCESS_KEY'),
2222
region='us-east-1'
2323
),
2424
'federal': EnvironmentConfig(
25-
access_key=os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_ACCESS_KEY_ID'),
26-
secret_key=os.getenv('DEVOPS_DOOP_AUTOMATION_AWS_SECRET_ACCESS_KEY'),
25+
access_key=os.getenv('DEVOPS_FEDERAL_AWS_ACCESS_KEY_ID'),
26+
secret_key=os.getenv('DEVOPS_FEDERAL_AWS_SECRET_ACCESS_KEY'),
2727
region='us-east-1'
2828
)
2929
}

0 commit comments

Comments
 (0)