Skip to content

Commit 0b6b863

Browse files
authored
chore: update things (#51)
* chore(deps): pre-commit autoupdate * chore: make these files match other projects * chore: pin shared action * chore: changes to renovate to align with current needs * chore: official tfdocs hook
1 parent 14225f3 commit 0b6b863

File tree

6 files changed

+51
-43
lines changed

6 files changed

+51
-43
lines changed

.github/workflows/validate.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ on:
1010

1111
jobs:
1212
validate-tf:
13-
uses: trussworks/shared-actions/.github/workflows/validate-tf.yml@main
13+
uses: trussworks/shared-actions/.github/workflows/validate-tf.yml@3cab03ab95045711da37ad6d63a93c666fc22398 # v0.0.2

.markdownlintrc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,6 @@
44
"first-line-h1": false,
55
"line_length": false,
66
"no-multiple-blanks": false,
7-
"no-inline-html": false
7+
"no-inline-html": false,
8+
"no-alt-text": false
89
}

.pre-commit-config.yaml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
repos:
22
- repo: https://github.com/pre-commit/pre-commit-hooks
3-
rev: v4.4.0
3+
rev: v5.0.0
44
hooks:
55
- id: check-json
66
- id: check-merge-conflict
@@ -15,7 +15,7 @@ repos:
1515
- id: mixed-line-ending
1616

1717
- repo: https://github.com/executablebooks/mdformat
18-
rev: 0.7.16
18+
rev: 0.7.21
1919
hooks:
2020
- id: mdformat
2121
additional_dependencies:
@@ -25,16 +25,16 @@ repos:
2525
exclude: README.m(ark)?d(own)?
2626

2727
- repo: https://github.com/igorshubovych/markdownlint-cli
28-
rev: v0.33.0
28+
rev: v0.43.0
2929
hooks:
3030
- id: markdownlint
3131

32-
- repo: https://github.com/detailyang/pre-commit-shell
33-
rev: 1.0.5
32+
- repo: https://github.com/terraform-docs/terraform-docs
33+
rev: "v0.19.0"
3434
hooks:
35-
- id: shell-lint
35+
- id: terraform-docs-go
3636

3737
- repo: https://github.com/antonbabenko/pre-commit-terraform
38-
rev: v1.77.1
38+
rev: v1.96.3
3939
hooks:
4040
- id: terraform_fmt

.terraform-docs.yml

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,25 @@
11
settings:
22
html: false
33
anchor: false
4+
escape: false
5+
lockfile: false
6+
hide-empty: true
47
formatter: "markdown table"
8+
9+
sections:
10+
show:
11+
- requirements
12+
- providers
13+
- modules
14+
- data-sources
15+
- resources
16+
- inputs
17+
- outputs
18+
19+
output:
20+
file: README.md
21+
mode: inject
22+
template: |-
23+
<!-- BEGIN_TF_DOCS -->
24+
{{ .Content }}
25+
<!-- END_TF_DOCS -->

README.md

Lines changed: 18 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -108,10 +108,6 @@ module "github_terraform_aws_ou_scp" {
108108
|------|---------|
109109
| aws | >= 3.0 |
110110

111-
## Modules
112-
113-
No modules.
114-
115111
## Resources
116112

117113
| Name | Type |
@@ -125,30 +121,26 @@ No modules.
125121

126122
| Name | Description | Type | Default | Required |
127123
|------|-------------|------|---------|:--------:|
128-
| allowed\_ec2\_instance\_types | EC2 instances types allowed for use | `list(string)` | ```[ "" ]``` | no |
129-
| allowed\_regions | AWS Regions allowed for use (for use with the restrict regions SCP) | `list(string)` | ```[ "" ]``` | no |
130-
| deny\_all | If false, create a combined policy. If true, deny all access | `bool` | `false` | no |
131-
| deny\_creating\_iam\_users | DenyCreatingIAMUsers in the OU policy. | `bool` | `false` | no |
132-
| deny\_deleting\_cloudwatch\_logs | DenyDeletingCloudwatchLogs in the OU policy. | `bool` | `false` | no |
133-
| deny\_deleting\_kms\_keys | DenyDeletingKMSKeys in the OU policy. | `bool` | `false` | no |
134-
| deny\_deleting\_route53\_zones | DenyDeletingRoute53Zones in the OU policy. | `bool` | `false` | no |
135-
| deny\_leaving\_orgs | DenyLeavingOrgs in the OU policy. | `bool` | `false` | no |
136-
| deny\_root\_account | DenyRootAccount in the OU policy. | `bool` | `false` | no |
137-
| deny\_s3\_bucket\_public\_access\_resources | S3 bucket resource ARNs to block public access | `list(string)` | ```[ "" ]``` | no |
138-
| deny\_s3\_buckets\_public\_access | DenyS3BucketsPublicAccess in the OU policy. | `bool` | `false` | no |
139-
| limit\_ec2\_instance\_types | LimitEC2InstanceTypes in the OU policy. | `bool` | `false` | no |
140-
| limit\_regions | LimitRegions in the OU policy. | `bool` | `false` | no |
141-
| protect\_iam\_role\_resources | IAM role resource ARNs to protect from modification and deletion | `list(string)` | ```[ "" ]``` | no |
142-
| protect\_iam\_roles | ProtectIAMRoles in the OU policy. | `bool` | `false` | no |
143-
| protect\_s3\_bucket\_resources | S3 bucket resource ARNs to protect from bucket and object deletion | `list(string)` | ```[ "" ]``` | no |
144-
| protect\_s3\_buckets | ProtectS3Buckets in the OU policy. | `bool` | `false` | no |
145-
| require\_s3\_encryption | DenyIncorrectEncryptionHeader and DenyUnEncryptedObjectUploads in the OU policy | `bool` | `false` | no |
124+
| allowed_ec2_instance_types | EC2 instances types allowed for use | `list(string)` | ```[ "" ]``` | no |
125+
| allowed_regions | AWS Regions allowed for use (for use with the restrict regions SCP) | `list(string)` | ```[ "" ]``` | no |
126+
| deny_all | If false, create a combined policy. If true, deny all access | `bool` | `false` | no |
127+
| deny_creating_iam_users | DenyCreatingIAMUsers in the OU policy. | `bool` | `false` | no |
128+
| deny_deleting_cloudwatch_logs | DenyDeletingCloudwatchLogs in the OU policy. | `bool` | `false` | no |
129+
| deny_deleting_kms_keys | DenyDeletingKMSKeys in the OU policy. | `bool` | `false` | no |
130+
| deny_deleting_route53_zones | DenyDeletingRoute53Zones in the OU policy. | `bool` | `false` | no |
131+
| deny_leaving_orgs | DenyLeavingOrgs in the OU policy. | `bool` | `false` | no |
132+
| deny_root_account | DenyRootAccount in the OU policy. | `bool` | `false` | no |
133+
| deny_s3_bucket_public_access_resources | S3 bucket resource ARNs to block public access | `list(string)` | ```[ "" ]``` | no |
134+
| deny_s3_buckets_public_access | DenyS3BucketsPublicAccess in the OU policy. | `bool` | `false` | no |
135+
| limit_ec2_instance_types | LimitEC2InstanceTypes in the OU policy. | `bool` | `false` | no |
136+
| limit_regions | LimitRegions in the OU policy. | `bool` | `false` | no |
137+
| protect_iam_role_resources | IAM role resource ARNs to protect from modification and deletion | `list(string)` | ```[ "" ]``` | no |
138+
| protect_iam_roles | ProtectIAMRoles in the OU policy. | `bool` | `false` | no |
139+
| protect_s3_bucket_resources | S3 bucket resource ARNs to protect from bucket and object deletion | `list(string)` | ```[ "" ]``` | no |
140+
| protect_s3_buckets | ProtectS3Buckets in the OU policy. | `bool` | `false` | no |
141+
| require_s3_encryption | DenyIncorrectEncryptionHeader and DenyUnEncryptedObjectUploads in the OU policy | `bool` | `false` | no |
146142
| tags | Tags applied to the SCP policy | `map(string)` | `{}` | no |
147143
| target | OU resource to attach SCP | ```object({ name = string id = string })``` | n/a | yes |
148-
149-
## Outputs
150-
151-
No outputs.
152144
<!-- END_TF_DOCS -->
153145

154146
## Developer Setup

renovate.json

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"extends": [
3-
"config:base",
4-
":disableDependencyDashboard"
3+
"config:recommended",
4+
"helpers:pinGitHubActionDigests"
55
],
66
"labels": [
77
"dependencies"
@@ -32,10 +32,7 @@
3232
"groupName": "dependencies",
3333
"managers": [
3434
"terraform",
35-
"gomod",
3635
"pre-commit",
37-
"circleci",
38-
"dockerfile",
3936
"github-actions"
4037
],
4138
"matchUpdateTypes": [
@@ -44,9 +41,6 @@
4441
]
4542
}
4643
],
47-
"postUpdateOptions": [
48-
"gomodTidy"
49-
],
5044
"schedule": [
5145
"every weekend"
5246
],

0 commit comments

Comments
 (0)