Skip to content

Commit 5de6ee0

Browse files
authored
Merge pull request #1 from opszero/update/tag
update tags
2 parents 5cfc0a7 + 3cc31ae commit 5de6ee0

File tree

15 files changed

+231
-46
lines changed

15 files changed

+231
-46
lines changed

.github/FUNDING.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
# These are supported funding model platforms
2+
3+
github: [abhiyerra]
4+
# patreon: # Replace with a single Patreon username
5+
# open_collective: # Replace with a single Open Collective username
6+
# ko_fi: # Replace with a single Ko-fi username
7+
# tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel
8+
# community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry
9+
# liberapay: # Replace with a single Liberapay username
10+
# issuehunt: # Replace with a single IssueHunt username
11+
# otechie: # Replace with a single Otechie username
12+
# lfx_crowdfunding: # Replace with a single LFX Crowdfunding project-name e.g., cloud-foundry
13+
custom: ["https://www.opszero.com"]

.github/dependabot.yml

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# To get started with Dependabot version updates, you'll need to specify which
2+
# package ecosystems to update and where the package manifests are located.
3+
# Please see the documentation for all configuration options:
4+
# https://docs.github.com/code-security/dependabot/dependabot-version-updates/configuration-options-for-the-dependabot.yml-file
5+
6+
version: 2
7+
updates:
8+
- package-ecosystem: "terraform"
9+
directory: "/"
10+
schedule:
11+
interval: "weekly"
12+
- package-ecosystem: "github-actions"
13+
directory: "/"
14+
schedule:
15+
interval: "weekly"
16+
- package-ecosystem: "npm"
17+
directory: "/"
18+
schedule:
19+
interval: "weekly"
20+
- package-ecosystem: "pip"
21+
directory: "/"
22+
schedule:
23+
interval: "weekly"

.github/pull_request_template.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
Closes # .
2+
3+
# Code Checklist
4+
5+
Ensure the following tasks are completed.
6+
7+
- [ ] Is dependencies added with `poetry add`?
8+
- [ ] Is the README.md updated?
9+
- [ ] Are tests included?
10+
- [ ] Are the tests running?
11+
- [ ] Are the names of the files correct?
12+
- [ ] Add PR/Issue to opsZero Project and set to `Review` column
13+
14+
# Reviewer Checklist
15+
16+
- [ ] Go through https://docs.opszero.com/intro.html#pull-request-checklist
17+
18+
# Business Checklist
19+
20+
- [ ] Is the marketing landing page updated?
21+
- [ ] Is the sales proposal updated?
22+
- [ ] Is the documentation updated

.github/workflows/pre-commit.yml

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,15 @@ jobs:
99
pre-commit:
1010
runs-on: ubuntu-latest
1111
steps:
12-
- uses: actions/checkout@v3
13-
- uses: actions/setup-python@v3
14-
- uses: pre-commit/action@v3.0.0
12+
- uses: actions/checkout@v4
13+
14+
- uses: actions/setup-python@v5
15+
with:
16+
python-version: "3.x"
17+
18+
- name: Setup Terraform
19+
uses: hashicorp/setup-terraform@v3
20+
with:
21+
terraform_version: 1.9.8
22+
23+
- uses: pre-commit/action@v3.0.1

.github/workflows/tf-lint.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,16 @@ jobs:
99
runs-on: ubuntu-latest
1010

1111
steps:
12-
- uses: actions/checkout@v4
12+
- uses: actions/checkout@v5
1313
name: Checkout source code
1414

15-
- uses: actions/cache@v3
15+
- uses: actions/cache@v4
1616
name: Cache plugin dir
1717
with:
1818
path: ~/.tflint.d/plugins
1919
key: ubuntu-latest-tflint-${{ hashFiles('.tflint.hcl') }}
2020

21-
- uses: terraform-linters/setup-tflint@v3
21+
- uses: terraform-linters/setup-tflint@v5
2222
name: Setup TFLint
2323
with:
2424
tflint_version: v0.44.1

.github/workflows/tfdocs.yml

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
name: Generate terraform docs
2+
on: [push]
3+
4+
jobs:
5+
docs:
6+
runs-on: ubuntu-latest
7+
steps:
8+
- uses: actions/checkout@v5
9+
with:
10+
ref: main
11+
12+
- name: Render terraform docs inside the README.md and push changes back to PR branch
13+
uses: terraform-docs/gh-actions@v1.4.1
14+
with:
15+
working-dir: .
16+
config-file: .terraform-docs.yml
17+
output-file: README.md
18+
output-method: inject
19+
indention: 3
20+
git-push: true
21+
git-commit-message: "terraform-docs: automated action"

.github/workflows/tfsec.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ jobs:
2626
GITHUB_TOKEN: ${{ github.token }}
2727

2828
- name: Terraform security scan Advanced
29-
uses: triat/terraform-security-scan@v3.1.0
29+
uses: triat/terraform-security-scan@v3.2.0
3030
if: github.event_name == 'pull_request'
3131
env:
3232
GITHUB_TOKEN: ${{ github.token }}

.terraform-docs.yml

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
formatter: "markdown"
2+
3+
version: ""
4+
5+
recursive:
6+
enabled: false
7+
path: modules
8+
9+
sections:
10+
hide: []
11+
show: []
12+
13+
content: |-
14+
{{ include "./usage.md" }}
15+
{{ .Providers }}
16+
{{ .Inputs }}
17+
{{ .Resources }}
18+
{{ .Outputs }}
19+
{{ include "./SUPPORT" }}
20+
output:
21+
file: README.md
22+
mode: inject
23+
template: |-
24+
<!-- BEGIN_TF_DOCS -->
25+
{{ .Content }}
26+
<!-- END_TF_DOCS -->
27+
output-values:
28+
enabled: false
29+
from: ""
30+
31+
sort:
32+
enabled: true
33+
by: name
34+
35+
settings:
36+
anchor: true
37+
color: true
38+
default: true
39+
description: false
40+
escape: true
41+
hide-empty: false
42+
html: true
43+
indent: 2
44+
lockfile: true
45+
read-comments: true
46+
required: true
47+
sensitive: true
48+
type: true

README.md

Lines changed: 53 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -185,47 +185,12 @@ Your Name Replace **MIT** and **opsZero** with the appropriate license and your
185185
This project is licensed under the **MIT** License - see the [LICENSE](https://github.com/opszero/terraform-aws-security-group/blob/master/LICENSE) file for details.
186186

187187
<!-- BEGIN_TF_DOCS -->
188-
## Requirements
189-
190-
| Name | Version |
191-
|------|---------|
192-
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.13.3 |
193-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 6.14.0 |
194188

195189
## Providers
196190

197191
| Name | Version |
198192
|------|---------|
199193
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 6.14.0 |
200-
201-
## Modules
202-
203-
No modules.
204-
205-
## Resources
206-
207-
| Name | Type |
208-
|------|------|
209-
| [aws_ec2_managed_prefix_list.prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ec2_managed_prefix_list) | resource |
210-
| [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group) | resource |
211-
| [aws_security_group_rule.existing_sg_egress_with_cidr_blocks](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
212-
| [aws_security_group_rule.existing_sg_egress_with_prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
213-
| [aws_security_group_rule.existing_sg_egress_with_self](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
214-
| [aws_security_group_rule.existing_sg_egress_with_source_sg_id](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
215-
| [aws_security_group_rule.existing_sg_ingress_cidr_blocks](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
216-
| [aws_security_group_rule.existing_sg_ingress_with_prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
217-
| [aws_security_group_rule.existing_sg_ingress_with_self](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
218-
| [aws_security_group_rule.existing_sg_ingress_with_source_sg_id](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
219-
| [aws_security_group_rule.new_sg_egress_with_cidr_blocks](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
220-
| [aws_security_group_rule.new_sg_egress_with_prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
221-
| [aws_security_group_rule.new_sg_egress_with_self](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
222-
| [aws_security_group_rule.new_sg_egress_with_source_sg_id](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
223-
| [aws_security_group_rule.new_sg_ingress_with_cidr_blocks](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
224-
| [aws_security_group_rule.new_sg_ingress_with_prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
225-
| [aws_security_group_rule.new_sg_ingress_with_self](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
226-
| [aws_security_group_rule.new_sg_ingress_with_source_sg_id](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
227-
| [aws_security_group.existing](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source |
228-
229194
## Inputs
230195

231196
| Name | Description | Type | Default | Required |
@@ -260,7 +225,29 @@ No modules.
260225
| <a name="input_sg_description"></a> [sg\_description](#input\_sg\_description) | Security group description. Defaults to Managed by Terraform. Cannot be empty string. NOTE: This field maps to the AWS GroupDescription attribute, for which there is no Update API. If you'd like to classify your security groups in a way that can be updated, use tags. | `string` | `null` | no |
261226
| <a name="input_tags"></a> [tags](#input\_tags) | Additional tags to apply to the security group | `map(string)` | `{}` | no |
262227
| <a name="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id) | The ID of the VPC that the instance security group belongs to. | `string` | `""` | no |
228+
## Resources
263229

230+
| Name | Type |
231+
|------|------|
232+
| [aws_ec2_managed_prefix_list.prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ec2_managed_prefix_list) | resource |
233+
| [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group) | resource |
234+
| [aws_security_group_rule.existing_sg_egress_with_cidr_blocks](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
235+
| [aws_security_group_rule.existing_sg_egress_with_prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
236+
| [aws_security_group_rule.existing_sg_egress_with_self](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
237+
| [aws_security_group_rule.existing_sg_egress_with_source_sg_id](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
238+
| [aws_security_group_rule.existing_sg_ingress_cidr_blocks](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
239+
| [aws_security_group_rule.existing_sg_ingress_with_prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
240+
| [aws_security_group_rule.existing_sg_ingress_with_self](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
241+
| [aws_security_group_rule.existing_sg_ingress_with_source_sg_id](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
242+
| [aws_security_group_rule.new_sg_egress_with_cidr_blocks](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
243+
| [aws_security_group_rule.new_sg_egress_with_prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
244+
| [aws_security_group_rule.new_sg_egress_with_self](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
245+
| [aws_security_group_rule.new_sg_egress_with_source_sg_id](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
246+
| [aws_security_group_rule.new_sg_ingress_with_cidr_blocks](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
247+
| [aws_security_group_rule.new_sg_ingress_with_prefix_list](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
248+
| [aws_security_group_rule.new_sg_ingress_with_self](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
249+
| [aws_security_group_rule.new_sg_ingress_with_source_sg_id](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource |
250+
| [aws_security_group.existing](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source |
264251
## Outputs
265252

266253
| Name | Description |
@@ -273,4 +260,35 @@ No modules.
273260
| <a name="output_security_group_arn"></a> [security\_group\_arn](#output\_security\_group\_arn) | IDs on the AWS Security Groups associated with the instance. |
274261
| <a name="output_security_group_id"></a> [security\_group\_id](#output\_security\_group\_id) | IDs on the AWS Security Groups associated with the instance. |
275262
| <a name="output_security_group_tags"></a> [security\_group\_tags](#output\_security\_group\_tags) | A mapping of public tags to assign to the resource. |
263+
# 🚀 Built by opsZero!
264+
265+
<a href="https://opszero.com"><img src="https://opszero.com/wp-content/uploads/2024/07/opsZero_logo_svg.svg" width="300px"/></a>
266+
267+
Since 2016 [opsZero](https://opszero.com) has been providing Kubernetes
268+
expertise to companies of all sizes on any Cloud. With a focus on AI and
269+
Compliance we can say we seen it all whether SOC2, HIPAA, PCI-DSS, ITAR,
270+
FedRAMP, CMMC we have you and your customers covered.
271+
272+
We provide support to organizations in the following ways:
273+
274+
- [Modernize or Migrate to Kubernetes](https://opszero.com/solutions/modernization/)
275+
- [Cloud Infrastructure with Kubernetes on AWS, Azure, Google Cloud, or Bare Metal](https://opszero.com/solutions/cloud-infrastructure/)
276+
- [Building AI and Data Pipelines on Kubernetes](https://opszero.com/solutions/ai/)
277+
- [Optimizing Existing Kubernetes Workloads](https://opszero.com/solutions/optimized-workloads/)
278+
279+
We do this with a high-touch support model where you:
280+
281+
- Get access to us on Slack, Microsoft Teams or Email
282+
- Get 24/7 coverage of your infrastructure
283+
- Get an accelerated migration to Kubernetes
284+
285+
Please [schedule a call](https://calendly.com/opszero-llc/discovery) if you need support.
286+
287+
<br/><br/>
288+
289+
<div style="display: block">
290+
<img src="https://opszero.com/wp-content/uploads/2024/07/aws-advanced.png" width="150px" />
291+
<img src="https://opszero.com/wp-content/uploads/2024/07/AWS-public-sector.png" width="150px" />
292+
<img src="https://opszero.com/wp-content/uploads/2024/07/AWS-eks.png" width="150px" />
293+
</div>
276294
<!-- END_TF_DOCS -->

SUPPORT

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
# 🚀 Built by opsZero!
2+
3+
<a href="https://opszero.com"><img src="https://opszero.com/wp-content/uploads/2024/07/opsZero_logo_svg.svg" width="300px"/></a>
4+
5+
Since 2016 [opsZero](https://opszero.com) has been providing Kubernetes
6+
expertise to companies of all sizes on any Cloud. With a focus on AI and
7+
Compliance we can say we seen it all whether SOC2, HIPAA, PCI-DSS, ITAR,
8+
FedRAMP, CMMC we have you and your customers covered.
9+
10+
We provide support to organizations in the following ways:
11+
12+
- [Modernize or Migrate to Kubernetes](https://opszero.com/solutions/modernization/)
13+
- [Cloud Infrastructure with Kubernetes on AWS, Azure, Google Cloud, or Bare Metal](https://opszero.com/solutions/cloud-infrastructure/)
14+
- [Building AI and Data Pipelines on Kubernetes](https://opszero.com/solutions/ai/)
15+
- [Optimizing Existing Kubernetes Workloads](https://opszero.com/solutions/optimized-workloads/)
16+
17+
We do this with a high-touch support model where you:
18+
19+
- Get access to us on Slack, Microsoft Teams or Email
20+
- Get 24/7 coverage of your infrastructure
21+
- Get an accelerated migration to Kubernetes
22+
23+
Please [schedule a call](https://calendly.com/opszero-llc/discovery) if you need support.
24+
25+
<br/><br/>
26+
27+
<div style="display: block">
28+
<img src="https://opszero.com/wp-content/uploads/2024/07/aws-advanced.png" width="150px" />
29+
<img src="https://opszero.com/wp-content/uploads/2024/07/AWS-public-sector.png" width="150px" />
30+
<img src="https://opszero.com/wp-content/uploads/2024/07/AWS-eks.png" width="150px" />
31+
</div>

0 commit comments

Comments
 (0)