infrastructure-as-code
Here are 1,186 public repositories matching this topic...
[BUG] inconsistent behaviour between supervisord.running and supervisord.dead for process groups
Description
let's say I have an apache process group I want to control.
- when using
supervisord.running, thenamemust beapache:*(which is the same notation used by supervisor) - when using
supervisord.dead, thenamemust beapache:(without the*)
As both states mirror each other, I expect them to use the same convention for name, the one from running since it
-
Updated
Aug 22, 2021 - Go
Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g. rake.gemspec has the information about rake.
To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*
We have two CDK applications:
- Application A bootstrapped with CDK v1.80 or so, with newStyleStackSynthesis manually set to true, eventually upgraded to CDK version 1.108.0 (template version 6)
- Application B, created using cdk init app shell command (cdk version 1.117.0), newStyleStackSynthesis flag is missing from automatically generated cdk.json file.
The bootstrapping process fro
-
Updated
Aug 22, 2021 - Java
-
Updated
Aug 19, 2021 - Go
-
Updated
Aug 21, 2021 - Go
Running infracost breakdown --config-file infracost.yml --terraform-workspace=ali-test correctly shows:
Error: --config-file flag cannot be used with the following flags: --path, --terraform-*, --usage-file
Our help text mentions the same thing:
--config-file string Path to Infracost config file. Cannot be used with path, terraform* or usage-file flags
However,
-
Updated
Aug 22, 2021 - Go
Is your feature request related to a problem? Please describe.
Yes. We've inherited a terraform repo with a lot of legacy problems. We've introduced checkov to ensure new config going
forward meets our standards. We've also generated baseline files for all of the existing legacy terraform config, so that we only fail checks for new problems. However, we'd like to keep visibility on all
-
Updated
Aug 16, 2021
-
Updated
Aug 21, 2021 - Python
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
Aug 17, 2021 - Go
-
Updated
Jul 4, 2021 - Python
-
Updated
May 16, 2021
-
Updated
Aug 3, 2021 - JavaScript
Copilot doesn't seem to have correct error behavior when I try to create a Scheduled Job with the same name as an existing service.
For example, in my app right now I have the following:
❯ copilot svc ls
Name Type
---- ----
fe Load Balanced Web Service
I can see this in SSM:
❯ aws ssm get-parameter --name /copilot/applicatio
Description
To complete #554, it can make sense to add resource source details for missing resources
Example
Follow pull-request attached to issues #874 #875 #876 for examples of implementation
-
Updated
Aug 19, 2021 - Go
-
Updated
Aug 13, 2021 - JavaScript
-
Updated
Sep 30, 2020 - Go
-
Updated
Aug 8, 2021 - HCL
-
Updated
May 8, 2021 - Markdown
-
Updated
Mar 14, 2021 - Ruby
-
Updated
Feb 27, 2018 - HCL
Garbage collection works by listing everything with the gc-tag. In a busy cluster, we really want that filter to happen server-side and ideally using an index of some sort.
That means we should use a Kubernetes label, not an annotation.
I think this will require a two-step migration plan (write both but continue to read annotation; release; drop support for annotation; release).
-
Updated
Apr 6, 2021 - HCL
-
Updated
Aug 21, 2021 - Shell
Improve this page
Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."
