Skip to content

Commit

Permalink
Merge pull request #106 from answerdigital/git-objects-fix
Browse files Browse the repository at this point in the history
Reset .git owner after terraform-docs
  • Loading branch information
cmbuckley authored Dec 3, 2024
2 parents 91a4d64 + 0f824ca commit 0d124fa
Show file tree
Hide file tree
Showing 3 changed files with 8 additions and 5 deletions.
3 changes: 3 additions & 0 deletions .github/workflows/update_assets.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,9 @@ jobs:
config-file: ${{ github.workspace }}/.terraform-docs.yml
output-method: inject

- name: Reset .git owner
run: "sudo chown -R $USER: .git"

- name: Update dependabot.yml
run: |
cp .github/dependabot-base.yml .github/dependabot.yml
Expand Down
6 changes: 3 additions & 3 deletions modules/aws/route53/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -41,16 +41,16 @@ The module also simplifies a few boilerplate records at the apex for security pu
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_alias_mx"></a> [alias\_mx](#input\_alias\_mx) | List of alias domains that should have the same MX records as the canonical domain. | `list(string)` | `[]` | no |
| <a name="input_alias_records"></a> [alias\_records](#input\_alias\_records) | List of DNS records for alias domains. The top-level keys should match entries in the `aliases`<br> list. The second-level map should match the same structure as `records`. | <pre>map(map(object({<br> name = optional(string)<br> ttl = optional(string)<br> type = string<br> records = list(string)<br> })))</pre> | `{}` | no |
| <a name="input_alias_records"></a> [alias\_records](#input\_alias\_records) | List of DNS records for alias domains. The top-level keys should match entries in the `aliases`<br/> list. The second-level map should match the same structure as `records`. | <pre>map(map(object({<br/> name = optional(string)<br/> ttl = optional(string)<br/> type = string<br/> records = list(string)<br/> })))</pre> | `{}` | no |
| <a name="input_alias_redirect_protocol"></a> [alias\_redirect\_protocol](#input\_alias\_redirect\_protocol) | Protocol to use when redirecting to the canonical domain. Valid values: `http`, `https`. | `string` | `"https"` | no |
| <a name="input_aliases"></a> [aliases](#input\_aliases) | List of alias domains that should redirect to the canonical domain. | `list(string)` | `[]` | no |
| <a name="input_apex_txt"></a> [apex\_txt](#input\_apex\_txt) | List of TXT records to be added at the apex. | `list(string)` | `[]` | no |
| <a name="input_caa_issuers"></a> [caa\_issuers](#input\_caa\_issuers) | List of CAs that can issue certificates. | `list(string)` | <pre>[<br> "amazon.com"<br>]</pre> | no |
| <a name="input_caa_issuers"></a> [caa\_issuers](#input\_caa\_issuers) | List of CAs that can issue certificates. | `list(string)` | <pre>[<br/> "amazon.com"<br/>]</pre> | no |
| <a name="input_canonical_mx_record"></a> [canonical\_mx\_record](#input\_canonical\_mx\_record) | The name of the MX record on the canonical domain. | `string` | `"apex_mx"` | no |
| <a name="input_comment"></a> [comment](#input\_comment) | A comment for the hosted zone. Defaults to 'Managed by Terraform'. | `string` | `null` | no |
| <a name="input_default_ttl"></a> [default\_ttl](#input\_default\_ttl) | Default TTL for DNS records. | `number` | `86400` | no |
| <a name="input_domain"></a> [domain](#input\_domain) | The top-level domain name to hold the records. | `string` | n/a | yes |
| <a name="input_records"></a> [records](#input\_records) | List of DNS records for the domain.<br><br> • `name` - (Optional) The name of the record. Defaults to the domain (i.e. an apex record).<br> • `ttl` - (Optional) The TTL of the record. Defaults to `default_ttl`.<br> • `type` - (Required) The record type.<br> • `records` - (Required) A string list of records. | <pre>map(object({<br> name = optional(string)<br> ttl = optional(string)<br> type = string<br> records = list(string)<br> }))</pre> | n/a | yes |
| <a name="input_records"></a> [records](#input\_records) | List of DNS records for the domain.<br/><br/> • `name` - (Optional) The name of the record. Defaults to the domain (i.e. an apex record).<br/> • `ttl` - (Optional) The TTL of the record. Defaults to `default_ttl`.<br/> • `type` - (Required) The record type.<br/> • `records` - (Required) A string list of records. | <pre>map(object({<br/> name = optional(string)<br/> ttl = optional(string)<br/> type = string<br/> records = list(string)<br/> }))</pre> | n/a | yes |
| <a name="input_security_contact"></a> [security\_contact](#input\_security\_contact) | Security contact for the domain. Defaults to 'security@DOMAIN', where `DOMAIN` is the top-level domain name. | `string` | `null` | no |
| <a name="input_spf"></a> [spf](#input\_spf) | List of SPF directives for the domain. | `list(string)` | `[]` | no |
| <a name="input_tags"></a> [tags](#input\_tags) | Tags for the hosted zone. | `map(any)` | `{}` | no |
Expand Down
4 changes: 2 additions & 2 deletions modules/aws/sso_account_assignment/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,9 +33,9 @@ to be used with AWS IAM Identity Center.

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_assignments"></a> [assignments](#input\_assignments) | List of assignments between group, account and Permission Set. The key of each object is the group<br> name that will be assigned the permissions. Ideally the organisation will use an external identity<br> provider and this group should be created via SCIM. To also create the groups, enable `create_groups`.<br><br> • `account_ids` - (Required) The AWS account IDs to apply the assignment.<br> • `permission_sets` - (Required) The Permission Sets to be assigned to the group. These should<br> be a subset of the Permission Sets created above. | <pre>map(list(object({<br> account_ids = list(string)<br> permission_sets = list(string)<br> })))</pre> | n/a | yes |
| <a name="input_assignments"></a> [assignments](#input\_assignments) | List of assignments between group, account and Permission Set. The key of each object is the group<br/> name that will be assigned the permissions. Ideally the organisation will use an external identity<br/> provider and this group should be created via SCIM. To also create the groups, enable `create_groups`.<br/><br/> • `account_ids` - (Required) The AWS account IDs to apply the assignment.<br/> • `permission_sets` - (Required) The Permission Sets to be assigned to the group. These should<br/> be a subset of the Permission Sets created above. | <pre>map(list(object({<br/> account_ids = list(string)<br/> permission_sets = list(string)<br/> })))</pre> | n/a | yes |
| <a name="input_create_groups"></a> [create\_groups](#input\_create\_groups) | Whether the module should also create the groups. | `bool` | `false` | no |
| <a name="input_permission_sets"></a> [permission\_sets](#input\_permission\_sets) | List of Permission Sets for the organization. Each Permission Set must include AWS managed<br> policies and/or an IAM inline policy.<br><br> • `name` - (Optional) The name of the Permission Set. The key will be used by default.<br> • `description` - (Optional) The description of the Permission Set.<br> • `managed_policies` - (Optional) A list of AWS-managed policy names. The prefix `arn:aws:iam::aws:policy/`<br> will be prepended to create the full ARN.<br> • `inline_policy` - (Optional) An IAM inline policy to attach to the Permission Set. | <pre>map(object({<br> name = optional(string)<br> description = optional(string)<br> managed_policies = optional(list(string), [])<br> inline_policy = optional(string, "")<br> }))</pre> | n/a | yes |
| <a name="input_permission_sets"></a> [permission\_sets](#input\_permission\_sets) | List of Permission Sets for the organization. Each Permission Set must include AWS managed<br/> policies and/or an IAM inline policy.<br/><br/> • `name` - (Optional) The name of the Permission Set. The key will be used by default.<br/> • `description` - (Optional) The description of the Permission Set.<br/> • `managed_policies` - (Optional) A list of AWS-managed policy names. The prefix `arn:aws:iam::aws:policy/`<br/> will be prepended to create the full ARN.<br/> • `inline_policy` - (Optional) An IAM inline policy to attach to the Permission Set. | <pre>map(object({<br/> name = optional(string)<br/> description = optional(string)<br/> managed_policies = optional(list(string), [])<br/> inline_policy = optional(string, "")<br/> }))</pre> | n/a | yes |
<!-- END_TF_DOCS -->

# Example Usage
Expand Down

0 comments on commit 0d124fa

Please sign in to comment.