infrastructure-as-code
Here are 1,540 public repositories matching this topic...
-
Updated
May 26, 2022 - Go
Description
I tried to use the state aptpkg.held as shown in the documentation, only for that state to apparently not exist.
I tried looping through state modules such as apt, pkg, and aptpkg with hold and held states, to find apt.held as the actually correct usage.
$ for major in apt pkg ap
Description
We have an air gapped environment without direct internet access. All necessary container images are mirrored to or proxied through an OnPrem registry (Artifactory). This registry uses a certificate from a private PKI. The vulnerability DB cannot be downloaded from this internal registry.
What did you expect to happen?
We expected that --insecure ignores the private PKI
Describe the bug
route53.HostZone.add_vpc sets regions for the stack's regions, not the VPC's region.
Expected Behavior
The regions for the VPCs should be correct.
"PrivateDnsE0FF4F9B": {
"Type": "AWS::Route53::HostedZone",
"Properties": {
"Name": "slurmiad.local.",
"VPCs": [
{
"VPCId": "vpc-nnnnnnnnnnnnnnnnn",
"VPCRegion": "us-east-1"
-
Updated
May 23, 2022 - Go
When setting INFRACOST_CURRENCY=EUR the format of the currency values is not correct.
Current Format
- Example in USD $3,938.10
- Example in EUR €3,736.11
Expected format
- Example in EUR: 3.736,11€
To make it as flexible as possible, it would be helpfull do define an addition environment variable to define the logic like
- EUR: XXX.XXX,00
- USD: XXX,XXX.00
USD can be
-
Updated
May 26, 2022 - Java
-
Updated
May 20, 2022 - Go
-
Updated
May 25, 2022 - Go
Describe the issue
On GCP if you apply a role via a policy that is applied none of the checks are performed. The example below should pass CKV_GCP_48 and fail CKV_GCP_44 (with my variables) but when checkov is run, no checks are run, pass or fail.
Examples\
data "google_iam_policy" "folder" {
binding {
role = "roles/owner"
members = var.a
-
Updated
May 25, 2022
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
May 23, 2022 - Go
The --prod flag has been deprecated, so we should not show that field in the output of the env show command, or in our docs:
https://aws.github.io/copilot-cli/docs/concepts/environments/
https://aws.github.io/copilot-cli/docs/commands/env-show/
-
Updated
May 20, 2022 - Python
-
Updated
May 11, 2022 - JavaScript
-
Updated
May 3, 2022 - Python
-
Updated
Apr 6, 2022
Description
One user found a useless timeouts block in its scan for aws_route_table resource. We should ignore it to avoid false positive drifts.
How to reproduce
Create a `aws_rou
-
Updated
May 25, 2022 - Go
-
Updated
May 16, 2022 - HCL
-
Updated
May 16, 2022 - JavaScript
-
Updated
Sep 30, 2020 - Go
-
Updated
May 8, 2021 - Markdown
-
Updated
May 24, 2022 - Ruby
-
Updated
May 26, 2022 - Open Policy Agent
-
Updated
May 23, 2022 - Go
-
Updated
May 25, 2022 - Shell
-
Updated
Apr 6, 2021 - HCL
Improve this page
Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."