Skip to content

Commit

Permalink
chore(deps): Fix goreleaser to use pinned version (#2148)
Browse files Browse the repository at this point in the history
* chore(deps): Fix goreleaser to use pinned version

* fix typos
  • Loading branch information
simar7 authored Jun 27, 2024
1 parent c221b67 commit 382ecff
Show file tree
Hide file tree
Showing 4 changed files with 6 additions and 6 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/gh_release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ jobs:
- name: Release
uses: goreleaser/goreleaser-action@v4
with:
version: latest
args: release --rm-dist -f .goreleaser_github.yml
version: v1.25.1
args: release --clean -f .goreleaser_github.yml
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
4 changes: 2 additions & 2 deletions .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -41,8 +41,8 @@ jobs:
- name: Release
uses: goreleaser/goreleaser-action@v4
with:
version: latest
args: release --rm-dist
version: v1.25.1
args: release --clean
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
Expand Down
2 changes: 1 addition & 1 deletion docs/checks/aws/cloudtrail/enable-all-regions/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ title: Cloudtrail should be enabled in all regions regardless of where your AWS

### Explanation

When creating Cloudtrail in the AWS Management Console the trail is configured by default to be multi-region, this isn't the case with the Terraform resource. Cloudtrail should cover the full AWS account to ensure you can track changes in regions you are not actively operting in.
When creating Cloudtrail in the AWS Management Console the trail is configured by default to be multi-region, this isn't the case with the Terraform resource. Cloudtrail should cover the full AWS account to ensure you can track changes in regions you are not actively operating in.

### Possible Impact
Activity could be happening in your account in a different region
Expand Down
2 changes: 1 addition & 1 deletion docs/checks/aws/redshift/use-vpc/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ title: Redshift cluster should be deployed into a specific VPC

### Explanation

Redshift clusters that are created without subnet details will be created in EC2 classic mode, meaning that they will be outside of a known VPC and running in tennant.
Redshift clusters that are created without subnet details will be created in EC2 classic mode, meaning that they will be outside of a known VPC and running in tenant.

In order to benefit from the additional security features achieved with using an owned VPC, the subnet should be set.

Expand Down

0 comments on commit 382ecff

Please sign in to comment.