shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

272
active users

#codecommit

0 posts0 participants0 posts today
Teri Radichel<p>Clone a CodeCommit Repository in a Lambda Function<br>~~<br>ACM.353 This took way longer than it should have to figure out<br>~~<br><a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/lambda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lambda</span></a> <a href="https://infosec.exchange/tags/codecommit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codecommit</span></a> <a href="https://infosec.exchange/tags/git" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>git</span></a> <a href="https://infosec.exchange/tags/clone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clone</span></a></p><p><a href="https://medium.com/cloud-security/clone-an-aws-codecommit-repository-in-a-lambda-function-e75aa59a736b" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/clon</span><span class="invisible">e-an-aws-codecommit-repository-in-a-lambda-function-e75aa59a736b</span></a></p>
Teri Radichel<p>Revisiting The Generic Lambda Function Objective<br>~~<br>ACM.346 Create a <a href="https://infosec.exchange/tags/Lambda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lambda</span></a> function to push changes in <a href="https://infosec.exchange/tags/CodeCommit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CodeCommit</span></a> to an <a href="https://infosec.exchange/tags/S3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>S3</span></a> bucket — The Function<br>~~<br><a href="https://infosec.exchange/tags/Lambda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lambda</span></a> <a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://infosec.exchange/tags/SCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SCP</span></a> </p><p><a href="https://medium.com/cloud-security/revisiting-the-generic-lambda-function-objective-94012345a797" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/revi</span><span class="invisible">siting-the-generic-lambda-function-objective-94012345a797</span></a></p>
Teri Radichel<p>AWS CodeCommit Triggers<br>~~<br>ACM.345 Seeking an <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/CodeCommit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CodeCommit</span></a> <a href="https://infosec.exchange/tags/trigger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>trigger</span></a> event for GitPush<br>~~<br>I explored whether I can trigger copying files to an S3 bucket with a trigger when I push files to AWS CodeCommit. Turned out to be a bit of a research project.</p><p><a href="https://medium.com/cloud-security/aws-codecommit-triggers-06fe3924deb0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/aws-</span><span class="invisible">codecommit-triggers-06fe3924deb0</span></a></p>
Teri Radichel<p>In this post we get things working to clone a repo from <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> to <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/CodeCommit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CodeCommit</span></a> but I show you what not to do. I’ve already deleted those credentials. Hopefully today I’ll show you how to fix it. And if it works out, how to sort of enforce <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a> to <a href="https://infosec.exchange/tags/clone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clone</span></a> a GitHub repo even though GitHub doesn’t support it. AWS CodeCommit does. We’ll see if I can work this out. :)</p><p><a href="https://medium.com/cloud-security/cloning-a-github-repo-to-aws-codecommit-40d10cedaf0c" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/clon</span><span class="invisible">ing-a-github-repo-to-aws-codecommit-40d10cedaf0c</span></a></p>
Teri Radichel<p>VPC with a <a href="https://infosec.exchange/tags/NAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NAT</span></a> and a <a href="https://infosec.exchange/tags/VPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPC</span></a> <a href="https://infosec.exchange/tags/Endpoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Endpoint</span></a> Deployed With <a href="https://infosec.exchange/tags/CloudFormation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudFormation</span></a><br>~~<br>ACM.276 Allow a <a href="https://infosec.exchange/tags/Lambda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lambda</span></a> function in a private network to access <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> via a NAT and <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/CodeCommit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CodeCommit</span></a> via a VPC <a href="https://infosec.exchange/tags/Endpoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Endpoint</span></a> <br>~~<br>by Teri Radichel | July 31, 2023<br><a href="https://infosec.exchange/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://infosec.exchange/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a></p><p><a href="https://medium.com/cloud-security/vpc-and-nat-and-a-vpcendpoint-deployed-with-cloudformation-229870a3d008" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/vpc-</span><span class="invisible">and-nat-and-a-vpcendpoint-deployed-with-cloudformation-229870a3d008</span></a></p>