diff --git a/.githooks/pre-commit b/.githooks/pre-commit
index 470ffc9..17c3e7f 100755
--- a/.githooks/pre-commit
+++ b/.githooks/pre-commit
@@ -58,10 +58,8 @@ if command_exists ./node_modules/.bin/prettier; then
echo "$files" | xargs ./node_modules/.bin/prettier --ignore-unknown --write
fi
-if command_exists tflint; then
- tflint --init
- tflint --config "$(pwd)/.tflint.hcl" --color --recursive
-fi
+# We don't have `tflint` in pre-commit hook because it doesn't ignore files
+# ignored in `.gitignore`. More details: https://github.com/terraform-linters/tflint/issues/2283
# Add the modified/prettified files to staging
echo "$files" | xargs git add
diff --git a/asset-account/terraform/stack-set/examples/self-managed/README.md b/asset-account/terraform/stack-set/examples/self-managed/README.md
index 0d7cb3a..0db6764 100644
--- a/asset-account/terraform/stack-set/examples/self-managed/README.md
+++ b/asset-account/terraform/stack-set/examples/self-managed/README.md
@@ -1,6 +1,6 @@
# Self-Managed StackSet Example
-This is a basic example of using the `elastio-asset-account-stack-set` terraform module with the self-managed AWS Cloudformation StackSet.
+This is a basic example of using the `elastio-asset-account-stack-set` terraform module with the self-managed AWS CloudFormation StackSet.
You can deploy it even within a single account. Just specify the `template_url` input variable at minimum.
diff --git a/asset-account/terraform/stack-set/examples/service-managed/README.md b/asset-account/terraform/stack-set/examples/service-managed/README.md
index 4af9f91..fe04054 100644
--- a/asset-account/terraform/stack-set/examples/service-managed/README.md
+++ b/asset-account/terraform/stack-set/examples/service-managed/README.md
@@ -1,6 +1,6 @@
# Service-Managed StackSet Example
-This is a basic example of using the `elastio-asset-account-stack-set` terraform module with the service-managed AWS Cloudformation StackSet.
+This is a basic example of using the `elastio-asset-account-stack-set` terraform module with the service-managed AWS CloudFormation StackSet.
You'll need to deploy it from the AWS Management account. You'll also need to specify both the input variables: `accounts` and `organizational_unit_ids`.
diff --git a/codegen/src/policies/ElastioAssetAccountDeployer.ts b/codegen/src/policies/ElastioAssetAccountDeployer.ts
index ce3b8d1..4ca6bd8 100644
--- a/codegen/src/policies/ElastioAssetAccountDeployer.ts
+++ b/codegen/src/policies/ElastioAssetAccountDeployer.ts
@@ -79,7 +79,7 @@ export default {
Sid: "ElastioIamDelete",
Action: ["iam:DeleteRole", "iam:DeletePolicy"],
- // A name wildcard is required here because if Cloudformation tries to delete
+ // A name wildcard is required here because if CloudFormation tries to delete
// a non-existing resource with a Condition based on `elastio:resource` tag,
// then it'll get a 403 AccessDenied error which it doesn't handle properly.
// It stops the stack deletion process in a DELETE_FAILED state:
diff --git a/connector/terraform/README.md b/connector/terraform/README.md
index b735ae3..fcc8bc3 100644
--- a/connector/terraform/README.md
+++ b/connector/terraform/README.md
@@ -60,7 +60,7 @@ This module deploys the following three modules internally, that you can deploy
### `elastio-connector-account` module
-Creates an AWS Cloudformation stack named `elastio-account-level-stack`, which is deployed once per AWS account and contains the required IAM resources (roles, policies, etc.) for Elastio Connector to operate in the same account.
+Creates an AWS CloudFormation stack named `elastio-account-level-stack`, which is deployed once per AWS account and contains the required IAM resources (roles, policies, etc.) for Elastio Connector to operate in the same account.
See [`modules/account`](./modules/account) directory for details.
@@ -72,7 +72,7 @@ See [`modules/region`](./modules/region) directory for details.
### `elastio-nat-provision` module
-_Optional._ AWS Cloudformation stack named `elastio-nat-provision-lambda` which deploys NAT gateways in the private subnets where Elastio scan job workers run. This is necessary only if you deploy Elastio into private subnets that don't have outbound Internet access already. Alternatively, you can deploy your own NAT gateway if you want to.
+_Optional._ AWS CloudFormation stack named `elastio-nat-provision-lambda` which deploys NAT gateways in the private subnets where Elastio scan job workers run. This is necessary only if you deploy Elastio into private subnets that don't have outbound Internet access already. Alternatively, you can deploy your own NAT gateway if you want to.
See [`modules/nat-provision`](./modules/nat-provision) directory for details.
@@ -111,14 +111,14 @@ No resources.
| [disable_customer_managed_iam_policies](#input_disable_customer_managed_iam_policies) | If this is set to `false` (or omitted), then the stack will create
additional customer-managed IAM policies that you can attach to your
IAM identities to grant them direct access to the Elastio Connector stack.
This way you can use elastio CLI directly to list Elastio scan jobs or
submit new scan jobs. Set this to `true` if you don't need these policies. | `bool` | `null` | no |
| [ecr_public_prefix](#input_ecr_public_prefix) | Repository prefix for the ECR Public registry. Used to configure a pull-through
cache for elastio images that are downloaded from ECR Public. You can configure
your own cache via ECR private, and then specify the repository prefix here.
This field supports 'account_id' and 'region' interpolation.
For example, such value can be provided:
'{{account\_id}}.dkr.ecr.{{region}}.amazonaws.com/ecr-public' | `string` | `null` | no |
| [elastio_cloud_connectors](#input_elastio_cloud_connectors) | List of regions where Cloud Connectors are to be deployed, VPC and subnet(s) to use,
and other regional configurations (mostly for regulatory compliance). |
list(object({
region = string
# Should not be set if `network_configuration`
# is set to `Auto` (which is the default)
vpc_id = optional(string)
subnet_ids = optional(list(string))
s3_access_logging = optional(object({
target_bucket = string
target_prefix = optional(string)
# Can be one of the following:
# - SimplePrefix
# - PartitionedPrefix:EventTime
# - PartitionedPrefix:DeliveryTime
target_object_key_format = optional(string)
}))
})) | n/a | yes |
-| [elastio_nat_provision_stack](#input_elastio_nat_provision_stack) | Specifies the version of Elastio NAT provision stack to deploy (e.g. `v5`).