-
Updated
Feb 19, 2021 - Go
infrastructure-as-code
Here are 1,023 public repositories matching this topic...
-
Updated
Feb 20, 2021 - Go
JobDefinition.buildJobContainer() explicitly only renders devices from container.linuxParams, omitting all other parameters.
The implementation for JobDefinition makes it seem like this is intentional.
Reproduction Steps
new JobDefinition(this, 'jobDef', {
container: {
linuxParams: new LinuxParameters(this, 'linuxParams', {
sharedMemory-
Updated
Feb 19, 2021 - Java
-
Updated
Feb 6, 2021 - Go
Requesting that you add the new Gitlab Provider as a new VCS Provider.
See here for the provider details: https://registry.terraform.io/providers/gitlabhq/gitlab/latest
-
Updated
Feb 19, 2021 - Go
Describe the bug
CKV_GCP_14 requires a backup configuration, but it does not take into consideration read replicas.
A read replica cannot have backup enabled in GCP.
To Reproduce
Steps to reproduce the behavior:
- Create a google_sql_database_instance with master_instance_name and replica_configuration
- Chekov will pop up error CKV_GCP_14
Expected behavior
Read replicas
-
Updated
Feb 15, 2021
-
Updated
Feb 18, 2021 - Python
-
Updated
Feb 19, 2021 - Go
-
Updated
Jan 29, 2021 - Python
-
Updated
Sep 16, 2020
-
Updated
Feb 15, 2021 - JavaScript
- terrascan version: 1.2
- Operating System: all
Description
When scanning a repo, if the severity field is not all caps (HIGH|MEDIUM|LOW), when violations are output, the color of the severity field does not show up. The compare should be case-insensitive, OR we can normalize the severity field.
What I Did
terrascan scan -d [dir]
I typoed my AWS_PROFILE name, so copilot init died, but it wasn't immediately obvious from the below output.
My suggestion is less of the debugging verbiage (unless the user requests it with --debug / --verbose) and more human friendly guidance like, "No valid AWS credentials found. Please read this doc <link to AWS credentials docs> to learn how to configure credentials."
$-
Updated
Feb 17, 2021 - Go
-
Updated
Sep 30, 2020 - Go
-
Updated
Dec 31, 2020 - Markdown
-
Updated
Feb 19, 2021 - Ruby
-
Updated
Feb 3, 2021 - HCL
-
Updated
Feb 27, 2018 - HCL
Garbage collection works by listing everything with the gc-tag. In a busy cluster, we really want that filter to happen server-side and ideally using an index of some sort.
That means we should use a Kubernetes label, not an annotation.
I think this will require a two-step migration plan (write both but continue to read annotation; release; drop support for annotation; release).
-
Updated
Nov 8, 2020 - HCL
-
Updated
Feb 15, 2021 - Perl
-
Updated
Feb 20, 2021 - Shell
-
Updated
Feb 18, 2021 - Python
Improve this page
Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."
Description
On this page: https://docs.saltproject.io/en/master/topics/development/contributing.html#pr-time
The link in the text in the first sentence "PR Guidelines" is linking to the develop branch and thus hitting a 404 page and should be going to https://docs.saltproject.io/en/master/topics/development/pull_requests.html or latest
Expected behavior
Expected to hit latest or mast