diff --git a/.github/workflows/continuous-integration-terraform.yml b/.github/workflows/continuous-integration-terraform.yml index 62d7f01..37f6d22 100644 --- a/.github/workflows/continuous-integration-terraform.yml +++ b/.github/workflows/continuous-integration-terraform.yml @@ -78,7 +78,7 @@ jobs: echo "GIT_COMMIT_MESSAGE=$(git show -s --format=%s)" >> $GITHUB_ENV - name: Generate Terraform docs - uses: terraform-docs/gh-actions@v1.2.2 + uses: terraform-docs/gh-actions@v1.3.0 if: "!startsWith(env.GITHUB_PR_BRANCH, 'renovate/')" with: working-dir: . @@ -88,7 +88,7 @@ jobs: fail-on-diff: true - name: Generate Terraform docs for Renovate - uses: terraform-docs/gh-actions@v1.2.2 + uses: terraform-docs/gh-actions@v1.3.0 if: "startsWith(env.GITHUB_PR_BRANCH, 'renovate/')" with: working-dir: . diff --git a/README.md b/README.md index 469c6eb..ed5ddf6 100644 --- a/README.md +++ b/README.md @@ -125,7 +125,7 @@ for dxw's Dalmatian hosting platform. | [cloudwatch\_slack\_alerts\_hook\_url](#input\_cloudwatch\_slack\_alerts\_hook\_url) | The Slack webhook URL for CloudWatch alerts | `string` | n/a | yes | | [cloudwatch\_slack\_alerts\_kms\_encryption](#input\_cloudwatch\_slack\_alerts\_kms\_encryption) | Use KMS encryption with the Slack Alerts SNS topic and logs | `bool` | n/a | yes | | [cloudwatch\_slack\_alerts\_log\_retention](#input\_cloudwatch\_slack\_alerts\_log\_retention) | Cloudwatch Slack Alerts log retention. Set to 0 to keep all logs | `number` | n/a | yes | -| [codestar\_connections](#input\_codestar\_connections) | CodeStar connections to create |
map(
object({
provider_type = string,
})
)
| n/a | yes | +| [codestar\_connections](#input\_codestar\_connections) | CodeStar connections to create |
map(
object({
provider_type = string,
})
)
| n/a | yes | | [delete\_default\_resources\_lambda\_kms\_encryption](#input\_delete\_default\_resources\_lambda\_kms\_encryption) | Conditionally encrypt the Delete Default Resources Lambda logs with KMS | `bool` | n/a | yes | | [delete\_default\_resources\_log\_retention](#input\_delete\_default\_resources\_log\_retention) | Log retention for the Delete Default Resources Lambda | `number` | n/a | yes | | [enable\_cloudtrail](#input\_enable\_cloudtrail) | Enable Cloudtrail | `bool` | n/a | yes | @@ -140,7 +140,7 @@ for dxw's Dalmatian hosting platform. | [route53\_root\_hosted\_zone\_domain\_name](#input\_route53\_root\_hosted\_zone\_domain\_name) | Route53 root hosted zone domain name | `string` | n/a | yes | | [tfvars\_s3\_enable\_s3\_bucket\_logging](#input\_tfvars\_s3\_enable\_s3\_bucket\_logging) | Enable S3 bucket logging on the tfvars S3 bucket | `bool` | `true` | no | | [tfvars\_s3\_logging\_bucket\_retention](#input\_tfvars\_s3\_logging\_bucket\_retention) | tfvars S3 Logging bucket retention in days. Set to 0 to keep all logs. | `number` | `30` | no | -| [tfvars\_s3\_tfvars\_files](#input\_tfvars\_s3\_tfvars\_files) | Map of objects containing tfvar file paths |
map(
object({
path = string
key = optional(string, "")
}
))
| `{}` | no | +| [tfvars\_s3\_tfvars\_files](#input\_tfvars\_s3\_tfvars\_files) | Map of objects containing tfvar file paths |
map(
object({
path = string
key = optional(string, "")
}
))
| `{}` | no | | [tfvars\_s3\_tfvars\_restrict\_access\_user\_ids](#input\_tfvars\_s3\_tfvars\_restrict\_access\_user\_ids) | List of AWS User IDs that require access to the tfvars S3 bucket. If left empty, all users within the AWS account will have access | `list(string)` | `[]` | no | ## Outputs