From 8e24e06c9c072b887dcb608aed7dafbfe1617d51 Mon Sep 17 00:00:00 2001 From: Mamraj Yadav Date: Fri, 8 Apr 2022 18:54:29 +0530 Subject: [PATCH] update github action --- .github/workflows/readme.yml | 4 ++-- .github/workflows/terratest.yml | 4 ++-- main.tf | 4 ++++ 3 files changed, 8 insertions(+), 4 deletions(-) diff --git a/.github/workflows/readme.yml b/.github/workflows/readme.yml index 26a6fee..8f09ef7 100644 --- a/.github/workflows/readme.yml +++ b/.github/workflows/readme.yml @@ -18,7 +18,7 @@ jobs: python-version: '3.x' - name: 'create readme' - uses: 'clouddrove/github-actions@v8.0' + uses: 'clouddrove/github-actions@v9.0.1' with: actions_subcommand: 'readme' github_token: '${{ secrets.GITHUB}}' @@ -35,7 +35,7 @@ jobs: continue-on-error: true - name: 'push readme' - uses: 'clouddrove/github-actions@v8.0' + uses: 'clouddrove/github-actions@v9.0.1' continue-on-error: true with: actions_subcommand: 'push' diff --git a/.github/workflows/terratest.yml b/.github/workflows/terratest.yml index 4a7e4d1..b2682ab 100644 --- a/.github/workflows/terratest.yml +++ b/.github/workflows/terratest.yml @@ -23,7 +23,7 @@ jobs: - name: 'Terratest for default-s3' if: ${{ github.event.label.name == 'terratest' }} - uses: 'clouddrove/github-actions@v8.0' + uses: 'clouddrove/github-actions@v9.0.1' with: actions_subcommand: 'terratest' tf_actions_working_dir: '_test/default-s3' @@ -33,7 +33,7 @@ jobs: - name: 'Terratest for encryption-s3' if: ${{ github.event.label.name == 'terratest' }} - uses: 'clouddrove/github-actions@v8.0' + uses: 'clouddrove/github-actions@v9.0.1' with: actions_subcommand: 'terratest' tf_actions_working_dir: '_test/encryption-s3' diff --git a/main.tf b/main.tf index ddde349..d85db47 100644 --- a/main.tf +++ b/main.tf @@ -23,6 +23,8 @@ module "labels" { # Description : Terraform module to create S3 bucket with different combination # type specific features. #tfsec:ignore:aws-s3-enable-bucket-encryption +#tfsec:ignore:aws-s3-block-public-acls +#tfsec:ignore:aws-s3-encryption-customer-key resource "aws_s3_bucket" "s3_default" { count = var.create_bucket == true ? 1 : 0 @@ -466,6 +468,8 @@ locals { } #tfsec:ignore:aws-s3-block-public-acls +#tfsec:ignore:aws-s3-block-public-policy +#tfsec:ignore:aws-s3-ignore-public-acls resource "aws_s3_bucket_public_access_block" "this" { count = var.create_bucket && var.attach_public_policy ? 1 : 0