Skip to content
#

infrastructure-as-code

Here are 1,540 public repositories matching this topic...

reedacus25
reedacus25 commented Mar 30, 2022

Description
I tried to use the state aptpkg.held as shown in the documentation, only for that state to apparently not exist.

I tried looping through state modules such as apt, pkg, and aptpkg with hold and held states, to find apt.held as the actually correct usage.

$ for major in apt pkg ap
Documentation severity-medium help-wanted doc-correction
mayrstefan
mayrstefan commented May 9, 2022

Description

We have an air gapped environment without direct internet access. All necessary container images are mirrored to or proxied through an OnPrem registry (Artifactory). This registry uses a certificate from a private PKI. The vulnerability DB cannot be downloaded from this internal registry.

What did you expect to happen?

We expected that --insecure ignores the private PKI

kind/bug help wanted good first issue
cartalla
cartalla commented May 25, 2022

Describe the bug

route53.HostZone.add_vpc sets regions for the stack's regions, not the VPC's region.

Expected Behavior

The regions for the VPCs should be correct.

  "PrivateDnsE0FF4F9B": {
   "Type": "AWS::Route53::HostedZone",
   "Properties": {
    "Name": "slurmiad.local.",
    "VPCs": [
     {
      "VPCId": "vpc-nnnnnnnnnnnnnnnnn",
      "VPCRegion": "us-east-1"
  
bug good first issue p1 @aws-cdk/aws-route53
infracost
Joerg-L
Joerg-L commented May 19, 2022

When setting INFRACOST_CURRENCY=EUR the format of the currency values is not correct.

Current Format

  • Example in USD $3,938.10
  • Example in EUR €3,736.11

Expected format

  • Example in EUR: 3.736,11€

To make it as flexible as possible, it would be helpfull do define an addition environment variable to define the logic like

  • EUR: XXX.XXX,00
  • USD: XXX,XXX.00

USD can be

enhancement good first issue
jezzirolk
jezzirolk commented May 11, 2022

Describe the issue
On GCP if you apply a role via a policy that is applied none of the checks are performed. The example below should pass CKV_GCP_48 and fail CKV_GCP_44 (with my variables) but when checkov is run, no checks are run, pass or fail.

Examples\

 data "google_iam_policy" "folder" {
   binding {
     role = "roles/owner"

     members = var.a
good first issue checks terraform
terrascan
adegoodyer
adegoodyer commented Aug 11, 2021
  • terrascan version: 1.9.0
  • terraform version: 1.0.1

Enhancement Request

Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.

Extremely useful when running the tool without halting a pipeline for example.

I currently use a workaround, but something more concrete would be very desira

huanjani
huanjani commented Mar 29, 2022

The --prod flag has been deprecated, so we should not show that field in the output of the env show command, or in our docs:

https://aws.github.io/copilot-cli/docs/concepts/environments/
https://aws.github.io/copilot-cli/docs/commands/env-show/

type/documentation good first issue size/S
driftctl

🚀 Geodesic is a DevOps Linux Toolbox in Docker. We use it as an interactive cloud automation shell. It's the fastest way to get up and running with a rock solid Open Source toolchain. ★ this repo! https://slack.cloudposse.com/

  • Updated May 25, 2022
  • Shell

Improve this page

Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."

Learn more