Skip to content

Commit

Permalink
chore(deps): update terraform cloudposse/s3-bucket/aws to v0.44.1 (#13)
Browse files Browse the repository at this point in the history
* chore(deps): update terraform cloudposse/s3-bucket/aws to v0.44.1

* Fix terratest

Co-authored-by: Renovate Bot <[email protected]>
Co-authored-by: cloudpossebot <[email protected]>
Co-authored-by: nitrocode <[email protected]>
  • Loading branch information
4 people authored Nov 25, 2021
1 parent cae3cb3 commit 833d1e5
Show file tree
Hide file tree
Showing 7 changed files with 219 additions and 176 deletions.
191 changes: 105 additions & 86 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -99,101 +99,118 @@ For automated tests of the complete example using [bats](https://github.com/bats
(which tests and deploys the example on AWS), see [test](test).

```hcl
module "label" {
source = "cloudposse/label/null"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"
namespace = "eg"
stage = "prod"
name = "fms"
delimiter = "-"
tags = {
"BusinessUnit" = "XYZ",
}
module "label" {
source = "cloudposse/label/null"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"
namespace = "eg"
stage = "prod"
name = "fms"
delimiter = "-"
tags = {
"BusinessUnit" = "XYZ",
}
}
module "vpc" {
source = "cloudposse/vpc/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"
module "vpc" {
source = "cloudposse/vpc/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"
cidr_block = "10.0.0.0/16"
cidr_block = "10.0.0.0/16"
context = module.label.context
}
context = module.label.context
provider "aws" {
region = "us-east-2"
}
provider "aws" {
region = "us-east-2"
alias = "admin"
assume_role {
role_arn = "arn:aws:xyz"
}
}
module "fms" {
source = "cloudposse/firewall-manager/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"
module "fms" {
source = "cloudposse/firewall-manager/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"
providers = {
aws.admin = aws.admin
aws = aws
}
security_groups_usage_audit_policies = [
{
name = "unused-sg"
resource_type_list = ["AWS::EC2::SecurityGroup"]
security_groups_usage_audit_policies = [
{
name = "unused-sg"
resource_type_list = ["AWS::EC2::SecurityGroup"]
policy_data = {
delete_unused_security_groups = false
coalesce_redundant_security_groups = false
}
policy_data = {
delete_unused_security_groups = false
coalesce_redundant_security_groups = false
}
]
}
]
security_groups_content_audit_policies = [
{
name = "maxmimum-allowed"
resource_type_list = ["AWS::EC2::SecurityGroup"]
security_groups_content_audit_policies = [
{
name = "maxmimum-allowed"
resource_type_list = ["AWS::EC2::SecurityGroup"]
policy_data = {
security_group_action = "allow"
security_groups = [module.vpc.security_group_id]
}
policy_data = {
security_group_action = "allow"
security_groups = [module.vpc.security_group_id]
}
]
security_groups_common_policies = [
{
name = "disabled-all"
resource_type_list = ["AWS::EC2::SecurityGroup"]
policy_data = {
revert_manual_security_group_changes = false
exclusive_resource_security_group_management = false
apply_to_all_ec2_instance_enis = false
security_groups = [module.vpc.security_group_id]
}
}
]
security_groups_common_policies = [
{
name = "disabled-all"
resource_type_list = ["AWS::EC2::SecurityGroup"]
policy_data = {
revert_manual_security_group_changes = false
exclusive_resource_security_group_management = false
apply_to_all_ec2_instance_enis = false
security_groups = [module.vpc.security_group_id]
}
]
waf_v2_policies = [
{
name = "linux-policy"
resource_type_list = ["AWS::ElasticLoadBalancingV2::LoadBalancer", "AWS::ApiGateway::Stage"]
policy_data = {
default_action = "allow"
override_customer_web_acl_association = false
pre_process_rule_groups = [
{
"managedRuleGroupIdentifier" : {
"vendorName" : "AWS",
"managedRuleGroupName" : "AWSManagedRulesLinuxRuleSet",
"version" : null
},
"overrideAction" : { "type" : "NONE" },
"ruleGroupArn" : null,
"excludeRules" : [],
"ruleGroupType" : "ManagedRuleGroup"
}
]
}
}
]
waf_v2_policies = [
{
name = "linux-policy"
resource_type_list = ["AWS::ElasticLoadBalancingV2::LoadBalancer", "AWS::ApiGateway::Stage"]
policy_data = {
default_action = "allow"
override_customer_web_acl_association = false
pre_process_rule_groups = [
{
"managedRuleGroupIdentifier" : {
"vendorName" : "AWS",
"managedRuleGroupName" : "AWSManagedRulesLinuxRuleSet",
"version" : null
},
"overrideAction" : { "type" : "NONE" },
"ruleGroupArn" : null,
"excludeRules" : [],
"ruleGroupType" : "ManagedRuleGroup"
}
]
}
]
}
]
context = module.label.context
}
context = module.label.context
}
```


Expand Down Expand Up @@ -225,22 +242,22 @@ Available targets:
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.15.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 2.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 2.0 |
| <a name="provider_aws.admin"></a> [aws.admin](#provider\_aws.admin) | >= 2.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.0 |
| <a name="provider_aws.admin"></a> [aws.admin](#provider\_aws.admin) | >= 3.0 |

## Modules

| Name | Source | Version |
|------|--------|---------|
| <a name="module_dns_firewall_label"></a> [dns\_firewall\_label](#module\_dns\_firewall\_label) | cloudposse/label/null | 0.25.0 |
| <a name="module_firehose_label"></a> [firehose\_label](#module\_firehose\_label) | cloudposse/label/null | 0.25.0 |
| <a name="module_firehose_s3_bucket"></a> [firehose\_s3\_bucket](#module\_firehose\_s3\_bucket) | cloudposse/s3-bucket/aws | 0.38.0 |
| <a name="module_firehose_s3_bucket"></a> [firehose\_s3\_bucket](#module\_firehose\_s3\_bucket) | cloudposse/s3-bucket/aws | 0.44.1 |
| <a name="module_network_firewall_label"></a> [network\_firewall\_label](#module\_network\_firewall\_label) | cloudposse/label/null | 0.25.0 |
| <a name="module_security_groups_common_label"></a> [security\_groups\_common\_label](#module\_security\_groups\_common\_label) | cloudposse/label/null | 0.25.0 |
| <a name="module_security_groups_content_audit_label"></a> [security\_groups\_content\_audit\_label](#module\_security\_groups\_content\_audit\_label) | cloudposse/label/null | 0.25.0 |
Expand Down Expand Up @@ -468,14 +485,16 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply
### Contributors

<!-- markdownlint-disable -->
| [![Vladimir Syromyatnikov][SweetOps_avatar]][SweetOps_homepage]<br/>[Vladimir Syromyatnikov][SweetOps_homepage] | [![Benjamin Smith][Benbentwo_avatar]][Benbentwo_homepage]<br/>[Benjamin Smith][Benbentwo_homepage] |
|---|---|
| [![Vladimir Syromyatnikov][SweetOps_avatar]][SweetOps_homepage]<br/>[Vladimir Syromyatnikov][SweetOps_homepage] | [![Benjamin Smith][Benbentwo_avatar]][Benbentwo_homepage]<br/>[Benjamin Smith][Benbentwo_homepage] | [![RB][nitrocode_avatar]][nitrocode_homepage]<br/>[RB][nitrocode_homepage] |
|---|---|---|
<!-- markdownlint-restore -->

[SweetOps_homepage]: https://github.com/SweetOps
[SweetOps_avatar]: https://img.cloudposse.com/150x150/https://github.com/SweetOps.png
[Benbentwo_homepage]: https://github.com/Benbentwo
[Benbentwo_avatar]: https://img.cloudposse.com/150x150/https://github.com/Benbentwo.png
[nitrocode_homepage]: https://github.com/nitrocode
[nitrocode_avatar]: https://img.cloudposse.com/150x150/https://github.com/nitrocode.png

[![README Footer][readme_footer_img]][readme_footer_link]
[![Beacon][beacon]][website]
Expand Down
Loading

0 comments on commit 833d1e5

Please sign in to comment.