diff --git a/docs/reference/modules/terraform-aws-ci/aws-helpers/aws-helpers.md b/docs/reference/modules/terraform-aws-ci/aws-helpers/aws-helpers.md index a08ef66a6..3105b0ce0 100644 --- a/docs/reference/modules/terraform-aws-ci/aws-helpers/aws-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/aws-helpers/aws-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # AWS Helpers -View Source +View Source Release Notes @@ -44,11 +44,11 @@ dependencies: diff --git a/docs/reference/modules/terraform-aws-ci/build-helpers/build-helpers.md b/docs/reference/modules/terraform-aws-ci/build-helpers/build-helpers.md index 6fa9b4646..928893e66 100644 --- a/docs/reference/modules/terraform-aws-ci/build-helpers/build-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/build-helpers/build-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Build Helpers -View Source +View Source Release Notes @@ -72,7 +72,7 @@ job using the [Jenkins Parameterized Trigger Plugin](https://wiki.jenkins-ci.org/display/JENKINS/Parameterized+Trigger+Plugin). The `deploy-app` CI job, in turn, would be a [parameterized build](https://wiki.jenkins-ci.org/display/JENKINS/Parameterized+Build) that takes as input a parameter called `ARTIFACT_ID` (the same parameter name that's in the `artifacts.properties` file) and use it, along -with the scripts in the [terraform-helpers module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/terraform-helpers) to automatically deploy the new AMI: +with the scripts in the [terraform-helpers module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/terraform-helpers) to automatically deploy the new AMI: ```bash cd templates @@ -186,11 +186,11 @@ Note that the following conditions must be true in order to use this feature: diff --git a/docs/reference/modules/terraform-aws-ci/check-url/check-url.md b/docs/reference/modules/terraform-aws-ci/check-url/check-url.md index 2c0fa7adf..f34536ed0 100644 --- a/docs/reference/modules/terraform-aws-ci/check-url/check-url.md +++ b/docs/reference/modules/terraform-aws-ci/check-url/check-url.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Check Url -View Source +View Source Release Notes @@ -80,11 +80,11 @@ Success! Got expected status code '200' and text '2.0.0' from URL http://www.my- diff --git a/docs/reference/modules/terraform-aws-ci/circleci-helpers/circleci-helpers.md b/docs/reference/modules/terraform-aws-ci/circleci-helpers/circleci-helpers.md index 50dd4f485..42998fb56 100644 --- a/docs/reference/modules/terraform-aws-ci/circleci-helpers/circleci-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/circleci-helpers/circleci-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # CircleCI Helpers -View Source +View Source Release Notes @@ -66,11 +66,11 @@ dependencies: diff --git a/docs/reference/modules/terraform-aws-ci/ec2-backup/ec2-backup.md b/docs/reference/modules/terraform-aws-ci/ec2-backup/ec2-backup.md index 71e4cc950..d1afafda9 100644 --- a/docs/reference/modules/terraform-aws-ci/ec2-backup/ec2-backup.md +++ b/docs/reference/modules/terraform-aws-ci/ec2-backup/ec2-backup.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # EC2 Backup Lambda Function Module -View Source +View Source Release Notes @@ -51,8 +51,8 @@ DLM: ## Example code -* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples/jenkins) for working sample code. -* See [vars.tf](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ec2-backup/vars.tf) for all parameters you can configure on this module. +* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples/jenkins) for working sample code. +* See [vars.tf](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ec2-backup/vars.tf) for all parameters you can configure on this module. ## Specifying an instance @@ -103,7 +103,7 @@ automatically delete older snapshots. You can specify two parameters to control module "ec_2_backup" { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ec2-backup?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ec2-backup?ref=v0.59.7" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -173,7 +173,7 @@ module "ec_2_backup" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ec2-backup?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ec2-backup?ref=v0.59.7" } inputs = { @@ -345,11 +345,11 @@ When true, all IAM policies will be managed as dedicated policies rather than in diff --git a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-invoke-iam-policy/ecs-deploy-runner-invoke-iam-policy.md b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-invoke-iam-policy/ecs-deploy-runner-invoke-iam-policy.md index d0e116f88..d653f067a 100644 --- a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-invoke-iam-policy/ecs-deploy-runner-invoke-iam-policy.md +++ b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-invoke-iam-policy/ecs-deploy-runner-invoke-iam-policy.md @@ -9,18 +9,18 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # ECS Deploy Runner Invoke IAM Policies module -View Source +View Source Release Notes This Terraform Module defines an [IAM policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html) that defines the minimal set of permissions necessary to trigger a deployment event for the deployment pipeline implemented -in the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner). +in the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner). ## Attaching IAM policy to IAM roles @@ -58,7 +58,7 @@ resource "aws_iam_role_policy_attachment" "example" { module "ecs_deploy_runner_invoke_iam_policy" { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-invoke-iam-policy?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-invoke-iam-policy?ref=v0.59.7" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -97,7 +97,7 @@ module "ecs_deploy_runner_invoke_iam_policy" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-invoke-iam-policy?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-invoke-iam-policy?ref=v0.59.7" } inputs = { @@ -210,11 +210,11 @@ The name of the IAM policy created with the permissions for invoking the ECS Dep diff --git a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-standard-configuration/ecs-deploy-runner-standard-configuration.md b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-standard-configuration/ecs-deploy-runner-standard-configuration.md index 92ef67a24..ea61b22c8 100644 --- a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-standard-configuration/ecs-deploy-runner-standard-configuration.md +++ b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-standard-configuration/ecs-deploy-runner-standard-configuration.md @@ -9,16 +9,16 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # ECS Deploy Runner Standard Configuration module -View Source +View Source Release Notes This Terraform Module provides a streamlined interface to configure the [ecs-deploy-runner -module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner) for a standard infrastructure and applications pipeline. This includes: +module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner) for a standard infrastructure and applications pipeline. This includes: * Base pipeline of build image, update variables, deploy infrastructure with Terraform/Terragrunt. * Restricting git repos that can deploy infrastructure. @@ -100,8 +100,8 @@ for more information). ## How do I invoke scripts in a given container? -You can use the [infrastructure-deployer CLI](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deployer) to invoke a deployed ECS deploy runner. Refer -to [How do I invoke the ECS deploy runner](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deployer/core-concepts.md#how-do-i-invoke-the-ecs-deploy-runner) +You can use the [infrastructure-deployer CLI](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deployer) to invoke a deployed ECS deploy runner. Refer +to [How do I invoke the ECS deploy runner](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deployer/core-concepts.md#how-do-i-invoke-the-ecs-deploy-runner) for more information. ## Sample Usage @@ -117,7 +117,7 @@ for more information. module "ecs_deploy_runner_standard_configuration" { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-standard-configuration?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-standard-configuration?ref=v0.59.7" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -223,7 +223,7 @@ module "ecs_deploy_runner_standard_configuration" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-standard-configuration?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-standard-configuration?ref=v0.59.7" } inputs = { @@ -953,11 +953,11 @@ Configuration map for the ecs-deploy-runner module that can be passed straight i diff --git a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner/ecs-deploy-runner.md b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner/ecs-deploy-runner.md index e715949a8..dca8d5d15 100644 --- a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner/ecs-deploy-runner.md +++ b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner/ecs-deploy-runner.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Infrastructure Pipeline: ECS Deploy Runner -View Source +View Source Release Notes @@ -29,7 +29,7 @@ This module can be used to set up a secure CI/CD pipeline for your infrastructur These workflows can be implemented without directly running the steps from your CI servers. Instead, the CI server can coordinate the CI / CD flow, and for anything that requires sensitive / powerful IAM permissions, it can trigger pre-defined, locked-down jobs in an isolated ECS task, and stream the logs from that task as if it’s running locally. -Refer to the [infrastructure-deployer CLI](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deployer) to integrate this with existing CI servers. You can also refer to the [infrastructure-deploy-script module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deploy-script) for more information on the underlying deployment scripts. +Refer to the [infrastructure-deployer CLI](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deployer) to integrate this with existing CI servers. You can also refer to the [infrastructure-deploy-script module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deploy-script) for more information on the underlying deployment scripts. ![Terraform and Terragrunt CI/CD architecture](/img/reference/modules/terraform-aws-ci/ecs-deploy-runner/tftg-pipeline-architecture.png) @@ -53,17 +53,17 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr ### Core concepts -* [Overview](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#overview): An overview of the architecture deployed by in this module, including how to implement a CI/CD pipeline for infrastructure code. +* [Overview](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#overview): An overview of the architecture deployed by in this module, including how to implement a CI/CD pipeline for infrastructure code. -* [Threat model of the deploy runner](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#threat-model-of-the-deploy-runner): An overview of the threat model used to design the security features of the solution, including a description of the potential attack vectors that are mitigated by the solution, and those attacks that require policy and behavioral changes to mitigate. +* [Threat model of the deploy runner](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#threat-model-of-the-deploy-runner): An overview of the threat model used to design the security features of the solution, including a description of the potential attack vectors that are mitigated by the solution, and those attacks that require policy and behavioral changes to mitigate. ### Repo organization -* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules. +* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules. -* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples): This folder contains working examples of how to use the submodules. +* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples): This folder contains working examples of how to use the submodules. -* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/test): Automated tests for the modules and examples. +* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/test): Automated tests for the modules and examples. ## Deploy @@ -71,29 +71,29 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr If you just want to try this repo out for experimenting and learning, check out the following resources: -* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage). +* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage). ## Manage -* [What configuration is recommended for container_images?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#what-configuration-is-recommended-for-container_images) +* [What configuration is recommended for container_images?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#what-configuration-is-recommended-for-container_images) -* [How do I restrict what args can be passed into the scripts?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#how-do-i-restrict-what-args-can-be-passed-into-the-scripts) +* [How do I restrict what args can be passed into the scripts?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#how-do-i-restrict-what-args-can-be-passed-into-the-scripts) -* [How do I trigger a deployment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#how-do-i-trigger-a-deployment) +* [How do I trigger a deployment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#how-do-i-trigger-a-deployment) -* [How do I trigger a deployment from CI?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#how-do-i-trigger-a-deployment-from-ci) +* [How do I trigger a deployment from CI?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#how-do-i-trigger-a-deployment-from-ci) -* [How do I customize the deployment task runtime environment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#what-container-is-used-for-the-deploy-task) +* [How do I customize the deployment task runtime environment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#what-container-is-used-for-the-deploy-task) -* [How do I use the deployment task container with a private VCS system such as GitHub Enterprise?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#how-do-i-use-the-ecs-deploy-runner-with-a-private-vcs-system-such-as-github-enterprise) +* [How do I use the deployment task container with a private VCS system such as GitHub Enterprise?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#how-do-i-use-the-ecs-deploy-runner-with-a-private-vcs-system-such-as-github-enterprise) -* [How do I stream logs from the deployment task?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#how-do-i-stream-logs-from-the-deployment-task) +* [How do I stream logs from the deployment task?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#how-do-i-stream-logs-from-the-deployment-task) -* [How do I access the stdout and stderr output from the underlying scripts?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#how-do-i-access-the-stdout-and-stderr-output-from-the-underlying-scripts) +* [How do I access the stdout and stderr output from the underlying scripts?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#how-do-i-access-the-stdout-and-stderr-output-from-the-underlying-scripts) -* [What are the IAM permissions necessary to trigger a deployment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner/core-concepts.md#what-are-the-iam-permissions-necessary-to-trigger-a-deployment) +* [What are the IAM permissions necessary to trigger a deployment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner/core-concepts.md#what-are-the-iam-permissions-necessary-to-trigger-a-deployment) -* [How do I see the list of supported containers?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deployer/core-concepts.md#how-do-i-see-the-list-of-supported-containers) +* [How do I see the list of supported containers?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deployer/core-concepts.md#how-do-i-see-the-list-of-supported-containers) ## Sample Usage @@ -108,7 +108,7 @@ If you just want to try this repo out for experimenting and learning, check out module "ecs_deploy_runner" { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner?ref=v0.59.7" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -332,7 +332,7 @@ module "ecs_deploy_runner" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner?ref=v0.59.7" } inputs = { @@ -1319,11 +1319,11 @@ Security Group ID of the ECS task diff --git a/docs/reference/modules/terraform-aws-ci/git-helpers/git-helpers.md b/docs/reference/modules/terraform-aws-ci/git-helpers/git-helpers.md index 86e4ca0ed..a9d18c620 100644 --- a/docs/reference/modules/terraform-aws-ci/git-helpers/git-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/git-helpers/git-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Git Helpers -View Source +View Source Release Notes @@ -71,11 +71,11 @@ The main options to pass to `git-add-commit-push` are: diff --git a/docs/reference/modules/terraform-aws-ci/github-release-helpers/github-release-helpers.md b/docs/reference/modules/terraform-aws-ci/github-release-helpers/github-release-helpers.md index b87d8b6f1..983c72bed 100644 --- a/docs/reference/modules/terraform-aws-ci/github-release-helpers/github-release-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/github-release-helpers/github-release-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # GitHub Release Helpers -View Source +View Source Release Notes @@ -83,11 +83,11 @@ create-release --repo-owner gruntwork-io --repo-name terragrunt-engine-opentofu diff --git a/docs/reference/modules/terraform-aws-ci/gruntwork-module-circleci-helpers/gruntwork-module-circleci-helpers.md b/docs/reference/modules/terraform-aws-ci/gruntwork-module-circleci-helpers/gruntwork-module-circleci-helpers.md index fc1503c03..4f921755c 100644 --- a/docs/reference/modules/terraform-aws-ci/gruntwork-module-circleci-helpers/gruntwork-module-circleci-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/gruntwork-module-circleci-helpers/gruntwork-module-circleci-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Gruntwork Module CircleCI Helpers -View Source +View Source Release Notes @@ -191,11 +191,11 @@ variables](https://circleci.com/docs/environment-variables/). diff --git a/docs/reference/modules/terraform-aws-ci/iam-policies/iam-policies.md b/docs/reference/modules/terraform-aws-ci/iam-policies/iam-policies.md index f731fb5d0..2caff1382 100644 --- a/docs/reference/modules/terraform-aws-ci/iam-policies/iam-policies.md +++ b/docs/reference/modules/terraform-aws-ci/iam-policies/iam-policies.md @@ -9,21 +9,21 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # IAM Policies -View Source +View Source Release Notes This folder contains modules that create an IAM Policy with the minimum permissions needed to support specific CI use cases. It includes: -* [ecr-docker-push](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/iam-policies/ecr-docker-push): An IAM Policy that enables checking for an existing Docker image in Amazon ECR and pushing a new one. -* [ecs-service-deployment](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/iam-policies/ecs-service-deployment): An IAM Policy that enables deploying a new Docker image to the ECS Cluster. -* [terraform-remote-state-s3](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/iam-policies/terraform-remote-state-s3): An IAM Policy that enables using Terraform Remote State with S3. -* [terragrunt](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/iam-policies/terragrunt): An IAM Policy that enables using the locking and user-identity features of Terragrunt. +* [ecr-docker-push](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/iam-policies/ecr-docker-push): An IAM Policy that enables checking for an existing Docker image in Amazon ECR and pushing a new one. +* [ecs-service-deployment](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/iam-policies/ecs-service-deployment): An IAM Policy that enables deploying a new Docker image to the ECS Cluster. +* [terraform-remote-state-s3](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/iam-policies/terraform-remote-state-s3): An IAM Policy that enables using Terraform Remote State with S3. +* [terragrunt](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/iam-policies/terragrunt): An IAM Policy that enables using the locking and user-identity features of Terragrunt. ## Background @@ -66,11 +66,11 @@ Some modules are configurable to support whatever level of diff --git a/docs/reference/modules/terraform-aws-ci/infrastructure-deploy-script/infrastructure-deploy-script.md b/docs/reference/modules/terraform-aws-ci/infrastructure-deploy-script/infrastructure-deploy-script.md index e2ff47406..bc1cd83ce 100644 --- a/docs/reference/modules/terraform-aws-ci/infrastructure-deploy-script/infrastructure-deploy-script.md +++ b/docs/reference/modules/terraform-aws-ci/infrastructure-deploy-script/infrastructure-deploy-script.md @@ -9,15 +9,15 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Infrastructure Pipeline: Infrastructure Deploy Scripts -View Source +View Source Release Notes -This module contains a script for deploying arbitrary infrastructure code stored in version control using [Terraform](https://www.terraform.io) and [Terragrunt](https://terragrunt.gruntwork.io). The deployment script can be used to set up secure CI/CD pipelines for infrastructure code. The deployment script can run in any environment (e.g directly in CI servers, ECS task, EKS pod) to remotely run infrastructure code based on version control events. Refer to the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner) to run the deployment in an isolated ECS task, separate from the CI servers. +This module contains a script for deploying arbitrary infrastructure code stored in version control using [Terraform](https://www.terraform.io) and [Terragrunt](https://terragrunt.gruntwork.io). The deployment script can be used to set up secure CI/CD pipelines for infrastructure code. The deployment script can run in any environment (e.g directly in CI servers, ECS task, EKS pod) to remotely run infrastructure code based on version control events. Refer to the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner) to run the deployment in an isolated ECS task, separate from the CI servers. ## Features @@ -33,15 +33,15 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr ### Core concepts -* [Overview of scripts](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deploy-script/core-concepts.md#overview): An overview of the scripts included in this module, including how to deploy and use the scripts to implement a CI/CD pipeline for IaC code. +* [Overview of scripts](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deploy-script/core-concepts.md#overview): An overview of the scripts included in this module, including how to deploy and use the scripts to implement a CI/CD pipeline for IaC code. ### Repo organization -* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules. +* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules. -* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples): This folder contains working examples of how to use the submodules. +* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples): This folder contains working examples of how to use the submodules. -* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/test): Automated tests for the modules and examples. +* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/test): Automated tests for the modules and examples. ## Deploy @@ -49,22 +49,22 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr If you just want to try this repo out for experimenting and learning, check out the following resources: -* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage). +* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage). ## Manage -* [Where do I run the deploy script?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deploy-script/core-concepts.md#where-do-i-run-the-deploy-script) +* [Where do I run the deploy script?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deploy-script/core-concepts.md#where-do-i-run-the-deploy-script) -* [What are the system requirements for the deploy script?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deploy-script/core-concepts.md#system-requirements) +* [What are the system requirements for the deploy script?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deploy-script/core-concepts.md#system-requirements) diff --git a/docs/reference/modules/terraform-aws-ci/infrastructure-deployer/infrastructure-deployer.md b/docs/reference/modules/terraform-aws-ci/infrastructure-deployer/infrastructure-deployer.md index 936ea3770..98d40fc18 100644 --- a/docs/reference/modules/terraform-aws-ci/infrastructure-deployer/infrastructure-deployer.md +++ b/docs/reference/modules/terraform-aws-ci/infrastructure-deployer/infrastructure-deployer.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Infrastructure Pipeline: Infrastructure Deployer CLI -View Source +View Source Release Notes @@ -27,9 +27,9 @@ This module contains a CLI that can be used to set up a secure CI/CD pipeline fo * Automatically update infrastructure configurations and deploying them -These workflows can be invoked on an isolated ECS task setup by the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner). +These workflows can be invoked on an isolated ECS task setup by the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner). -Refer to the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ecs-deploy-runner) for more information on the ECS task. +Refer to the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ecs-deploy-runner) for more information on the ECS task. ## Features @@ -51,15 +51,15 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr ### Core concepts -* [Overview](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deployer/core-concepts.md#overview): An overview of the CLI and how to use it within CI jobs to implement an automated workflow for infrastructure code. +* [Overview](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deployer/core-concepts.md#overview): An overview of the CLI and how to use it within CI jobs to implement an automated workflow for infrastructure code. ### Repo organization -* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules. +* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules. -* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples): This folder contains working examples of how to use the submodules. +* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples): This folder contains working examples of how to use the submodules. -* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/test): Automated tests for the modules and examples. +* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/test): Automated tests for the modules and examples. ## Deploy @@ -67,24 +67,24 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr If you just want to try this repo out for experimenting and learning, check out the following resources: -* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage). +* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage). ## Manage -* [How do I install the infrastructure-deployer CLI?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deployer/core-concepts.md#how-do-i-install-the-infrastructure-deployer-cli) +* [How do I install the infrastructure-deployer CLI?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deployer/core-concepts.md#how-do-i-install-the-infrastructure-deployer-cli) -* [What are the IAM permissions](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deployer/core-concepts.md#what-are-the-iam-permissions-necessary-to-trigger-a-deployment) +* [What are the IAM permissions](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deployer/core-concepts.md#what-are-the-iam-permissions-necessary-to-trigger-a-deployment) -* [How do I invoke the ECS deploy runner?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/infrastructure-deployer/core-concepts.md#how-do-i-invoke-the-ecs-deploy-runner) +* [How do I invoke the ECS deploy runner?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/infrastructure-deployer/core-concepts.md#how-do-i-invoke-the-ecs-deploy-runner) diff --git a/docs/reference/modules/terraform-aws-ci/install-jenkins/install-jenkins.md b/docs/reference/modules/terraform-aws-ci/install-jenkins/install-jenkins.md index 7533f7204..619b7855b 100644 --- a/docs/reference/modules/terraform-aws-ci/install-jenkins/install-jenkins.md +++ b/docs/reference/modules/terraform-aws-ci/install-jenkins/install-jenkins.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Install Jenkins Module -View Source +View Source Release Notes @@ -26,8 +26,8 @@ This module contains two scripts for working with [Jenkins CI server](https://je ## Example code -* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples/jenkins) for working sample code. -* See [install.sh](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/install-jenkins/install.sh) and [run-jenkins.sh](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/install-jenkins/run-jenkins) for all options you can pass to these scripts. +* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples/jenkins) for working sample code. +* See [install.sh](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/install-jenkins/install.sh) and [run-jenkins.sh](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/install-jenkins/run-jenkins) for all options you can pass to these scripts. ## Install Jenkins @@ -45,13 +45,13 @@ gruntwork-install \ The command above will copy `install.sh` to your server, run it, install Jenkins 2.164.3, and copy the `run-jenkins` script into `/usr/local/bin`. We recommend running this command in a [Packer template](https://www.packer.io/) so you -can create an AMI with Jenkins installed. Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples/jenkins) for an example of such a +can create an AMI with Jenkins installed. Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples/jenkins) for an example of such a Packer template. ## Run Jenkins Once you have an AMI with Jenkins installed, you need to deploy it on an EC2 Instance in AWS. The easiest way to do -this is with the [jenkins-server module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/jenkins-server). When the EC2 Instance is booting, you should +this is with the [jenkins-server module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/jenkins-server). When the EC2 Instance is booting, you should typically do two things in [User Data](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/user-data.html): 1. Mount an EBS volume for the Jenkins home directory. You want to use an EBS volume so that your Jenkins data is @@ -68,16 +68,16 @@ typically do two things in [User Data](https://docs.aws.amazon.com/AWSEC2/latest --jenkins-home "/jenkins" ``` -Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples/jenkins) for an example of such a User Data script. +Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples/jenkins) for an example of such a User Data script. diff --git a/docs/reference/modules/terraform-aws-ci/jenkins-server/jenkins-server.md b/docs/reference/modules/terraform-aws-ci/jenkins-server/jenkins-server.md index 9597f289a..ec1b1365b 100644 --- a/docs/reference/modules/terraform-aws-ci/jenkins-server/jenkins-server.md +++ b/docs/reference/modules/terraform-aws-ci/jenkins-server/jenkins-server.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Jenkins server -View Source +View Source Release Notes @@ -29,17 +29,17 @@ to run an ASG for Jenkins that can correctly reattach an EBS volume. ## Example code -* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples/jenkins) for working sample code. -* See [vars.tf](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/jenkins-server/vars.tf) for all parameters you can configure on this module. +* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples/jenkins) for working sample code. +* See [vars.tf](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/jenkins-server/vars.tf) for all parameters you can configure on this module. ## Jenkins AMI -See the [install-jenkins module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/install-jenkins) for a way to create an AMI with Jenkins installed and a +See the [install-jenkins module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/install-jenkins) for a way to create an AMI with Jenkins installed and a script you can run in User Data to start Jenkins while the server is booting. ## Backing up Jenkins -See the [ec2-backup module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/ec2-backup) for an automatic way to take scheduled backups of Jenkins and its EBS +See the [ec2-backup module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/ec2-backup) for an automatic way to take scheduled backups of Jenkins and its EBS volume. ## IAM permissions @@ -112,7 +112,7 @@ data "aws_iam_policy_document" "example" { module "jenkins_server" { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/jenkins-server?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/jenkins-server?ref=v0.59.7" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -385,7 +385,7 @@ module "jenkins_server" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/jenkins-server?ref=v0.59.6" + source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/jenkins-server?ref=v0.59.7" } inputs = { @@ -1252,11 +1252,11 @@ A maximum duration to wait for each server to be healthy before timing out (e.g. diff --git a/docs/reference/modules/terraform-aws-ci/kubernetes-circleci-helpers/kubernetes-circleci-helpers.md b/docs/reference/modules/terraform-aws-ci/kubernetes-circleci-helpers/kubernetes-circleci-helpers.md index bfad2d640..829aca451 100644 --- a/docs/reference/modules/terraform-aws-ci/kubernetes-circleci-helpers/kubernetes-circleci-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/kubernetes-circleci-helpers/kubernetes-circleci-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Kubernetes CircleCI Helpers -View Source +View Source Release Notes @@ -98,11 +98,11 @@ job: diff --git a/docs/reference/modules/terraform-aws-ci/monorepo-helpers/monorepo-helpers.md b/docs/reference/modules/terraform-aws-ci/monorepo-helpers/monorepo-helpers.md index 1ce37e18e..92ac5fdb8 100644 --- a/docs/reference/modules/terraform-aws-ci/monorepo-helpers/monorepo-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/monorepo-helpers/monorepo-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Infrastructure Pipeline: Monorepo Helpers -View Source +View Source Release Notes @@ -41,15 +41,15 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr ### Core concepts -* [Overview of scripts](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/monorepo-helpers/core-concepts.md#overview): An overview of the scripts included in this module, including how they work. +* [Overview of scripts](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/monorepo-helpers/core-concepts.md#overview): An overview of the scripts included in this module, including how they work. ### Repo organization -* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules. +* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules. -* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/examples): This folder contains working examples of how to use the submodules. +* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/examples): This folder contains working examples of how to use the submodules. -* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/test): Automated tests for the modules and examples. +* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/test): Automated tests for the modules and examples. ## Deploy @@ -57,7 +57,7 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr If you just want to try this module out for experimenting and learning, check out the following resources: -* [CircleCI Quickstart](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/monorepo-helpers/core-concepts.md#circleci-quickstart): Quickstart guide for integrating the scripts into CircleCI to setup dynamic test selection. +* [CircleCI Quickstart](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/monorepo-helpers/core-concepts.md#circleci-quickstart): Quickstart guide for integrating the scripts into CircleCI to setup dynamic test selection. ### Production deployment @@ -65,22 +65,22 @@ If you just want to try this module out for experimenting and learning, check ou ## Manage -* [How to configure direct test mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/monorepo-helpers/core-concepts.md#how-to-configure-direct-test-mappings) +* [How to configure direct test mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/monorepo-helpers/core-concepts.md#how-to-configure-direct-test-mappings) -* [How to override the files checked by validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/monorepo-helpers/core-concepts.md#how-to-override-the-files-checked-by-validate-monorepo-test-mappings) +* [How to override the files checked by validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/monorepo-helpers/core-concepts.md#how-to-override-the-files-checked-by-validate-monorepo-test-mappings) -* [Adding a new module to a repo with validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/monorepo-helpers/core-concepts.md#adding-a-new-module-to-a-repo-with-validate-monorepo-test-mappings) +* [Adding a new module to a repo with validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/monorepo-helpers/core-concepts.md#adding-a-new-module-to-a-repo-with-validate-monorepo-test-mappings) -* [Adding a new file that has no tests to a repo with validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/monorepo-helpers/core-concepts.md#adding-a-new-file-that-has-no-tests-to-a-repo-with-validate-monorepo-test-mappings) +* [Adding a new file that has no tests to a repo with validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/monorepo-helpers/core-concepts.md#adding-a-new-file-that-has-no-tests-to-a-repo-with-validate-monorepo-test-mappings) diff --git a/docs/reference/modules/terraform-aws-ci/sign-binary-helpers/sign-binary-helpers.md b/docs/reference/modules/terraform-aws-ci/sign-binary-helpers/sign-binary-helpers.md index 7bbfbdc6b..444fc889e 100644 --- a/docs/reference/modules/terraform-aws-ci/sign-binary-helpers/sign-binary-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/sign-binary-helpers/sign-binary-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Binary signing Helpers -View Source +View Source Release Notes @@ -149,11 +149,11 @@ References: diff --git a/docs/reference/modules/terraform-aws-ci/terraform-helpers/terraform-helpers.md b/docs/reference/modules/terraform-aws-ci/terraform-helpers/terraform-helpers.md index 98acb5a75..7360534b1 100644 --- a/docs/reference/modules/terraform-aws-ci/terraform-helpers/terraform-helpers.md +++ b/docs/reference/modules/terraform-aws-ci/terraform-helpers/terraform-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Terraform Helpers -View Source +View Source Release Notes @@ -38,7 +38,7 @@ You can install these scripts using the [Gruntwork Installer](https://github.com gruntwork-install --module-name "terraform-helpers" --repo "https://github.com/gruntwork-io/terraform-aws-ci" --tag "0.0.1" ``` -Note that `terraform-update-variable` depends on the [git-helpers module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.6/modules/git-helpers) being installed! +Note that `terraform-update-variable` depends on the [git-helpers module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.7/modules/git-helpers) being installed! See the examples in the next section for how to use them. @@ -340,11 +340,11 @@ and `apply` actions so that Terraform/Terragrunt can run. If you wish to impleme