Skip to content

Commit

Permalink
update github action
Browse files Browse the repository at this point in the history
  • Loading branch information
Mamraj Yadav committed Apr 8, 2022
1 parent e145290 commit 8e24e06
Show file tree
Hide file tree
Showing 3 changed files with 8 additions and 4 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/readme.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ jobs:
python-version: '3.x'

- name: 'create readme'
uses: 'clouddrove/github-actions@v8.0'
uses: 'clouddrove/github-actions@v9.0.1'
with:
actions_subcommand: 'readme'
github_token: '${{ secrets.GITHUB}}'
Expand All @@ -35,7 +35,7 @@ jobs:
continue-on-error: true

- name: 'push readme'
uses: 'clouddrove/github-actions@v8.0'
uses: 'clouddrove/github-actions@v9.0.1'
continue-on-error: true
with:
actions_subcommand: 'push'
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/terratest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ jobs:

- name: 'Terratest for default-s3'
if: ${{ github.event.label.name == 'terratest' }}
uses: 'clouddrove/github-actions@v8.0'
uses: 'clouddrove/github-actions@v9.0.1'
with:
actions_subcommand: 'terratest'
tf_actions_working_dir: '_test/default-s3'
Expand All @@ -33,7 +33,7 @@ jobs:

- name: 'Terratest for encryption-s3'
if: ${{ github.event.label.name == 'terratest' }}
uses: 'clouddrove/github-actions@v8.0'
uses: 'clouddrove/github-actions@v9.0.1'
with:
actions_subcommand: 'terratest'
tf_actions_working_dir: '_test/encryption-s3'
Expand Down
4 changes: 4 additions & 0 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,8 @@ module "labels" {
# Description : Terraform module to create S3 bucket with different combination
# type specific features.
#tfsec:ignore:aws-s3-enable-bucket-encryption
#tfsec:ignore:aws-s3-block-public-acls
#tfsec:ignore:aws-s3-encryption-customer-key
resource "aws_s3_bucket" "s3_default" {
count = var.create_bucket == true ? 1 : 0

Expand Down Expand Up @@ -466,6 +468,8 @@ locals {
}

#tfsec:ignore:aws-s3-block-public-acls
#tfsec:ignore:aws-s3-block-public-policy
#tfsec:ignore:aws-s3-ignore-public-acls
resource "aws_s3_bucket_public_access_block" "this" {
count = var.create_bucket && var.attach_public_policy ? 1 : 0

Expand Down

0 comments on commit 8e24e06

Please sign in to comment.