Skip to content

Commit 9efb2da

Browse files
committed
chore: fix precommit
1 parent 26d85de commit 9efb2da

File tree

10 files changed

+48
-44
lines changed

10 files changed

+48
-44
lines changed

examples/organizational/README.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,8 +145,8 @@ $ terraform apply
145145

146146
| Name | Version |
147147
|------|---------|
148-
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.18.0 |
149-
| <a name="provider_aws.member"></a> [aws.member](#provider\_aws.member) | 4.18.0 |
148+
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.19.0 |
149+
| <a name="provider_aws.member"></a> [aws.member](#provider\_aws.member) | 4.19.0 |
150150
| <a name="provider_sysdig"></a> [sysdig](#provider\_sysdig) | 0.5.37 |
151151

152152
## Modules
@@ -195,6 +195,7 @@ $ terraform apply
195195
| <a name="input_name"></a> [name](#input\_name) | Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances | `string` | `"sfc"` | no |
196196
| <a name="input_organizational_member_default_admin_role"></a> [organizational\_member\_default\_admin\_role](#input\_organizational\_member\_default\_admin\_role) | Default role created by AWS for management-account users to be able to admin member accounts.<br/>https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html | `string` | `"OrganizationAccountAccessRole"` | no |
197197
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags. always include 'product' default tag for resource-group proper functioning | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
198+
| <a name="input_use_standalone_scanner"></a> [use\_standalone\_scanner](#input\_use\_standalone\_scanner) | true/false whether use inline scanner or not | `bool` | `false` | no |
198199

199200
## Outputs
200201

examples/organizational/main.tf

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
locals {
2-
deploy_image_scanning = var.deploy_image_scanning_ecr || var.deploy_image_scanning_ecs
3-
deploy_scanning_infra = local.deploy_image_scanning && !var.use_standalone_scanner
2+
deploy_image_scanning = var.deploy_image_scanning_ecr || var.deploy_image_scanning_ecs
3+
deploy_scanning_infra = local.deploy_image_scanning && !var.use_standalone_scanner
44
}
55
#-------------------------------------
66
# resources deployed always in management account
@@ -17,16 +17,16 @@ module "resource_group_secure_for_cloud_member" {
1717
providers = {
1818
aws = aws.member
1919
}
20-
source = "../../modules/infrastructure/resource-group"
21-
name = var.name
22-
tags = var.tags
20+
source = "../../modules/infrastructure/resource-group"
21+
name = var.name
22+
tags = var.tags
2323
}
2424

2525
#-------------------------------------
2626
# secure-for-cloud member account workload
2727
#-------------------------------------
2828
module "ssm" {
29-
providers = {
29+
providers = {
3030
aws = aws.member
3131
}
3232
source = "../../modules/infrastructure/ssm"
@@ -42,14 +42,14 @@ module "ssm" {
4242
module "codebuild" {
4343
count = local.deploy_scanning_infra ? 1 : 0
4444

45-
providers = {
45+
providers = {
4646
aws = aws.member
4747
}
4848
source = "../../modules/infrastructure/codebuild"
4949
name = var.name
5050
secure_api_token_secret_name = module.ssm.secure_api_token_secret_name
5151

52-
tags = var.tags
52+
tags = var.tags
5353
# note. this is required to avoid race conditions
5454
depends_on = [module.ssm]
5555
}
@@ -68,7 +68,7 @@ module "cloud_connector" {
6868
deploy_image_scanning_ecs = var.deploy_image_scanning_ecs
6969
use_standalone_scanner = var.use_standalone_scanner
7070

71-
is_organizational = true
71+
is_organizational = true
7272
organizational_config = {
7373
sysdig_secure_for_cloud_role_arn = module.secure_for_cloud_role.sysdig_secure_for_cloud_role_arn
7474
organizational_role_per_account = var.organizational_member_default_admin_role

examples/single-account-apprunner/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,7 @@ $ terraform apply
104104
| <a name="input_deploy_image_scanning_ecs"></a> [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs) | true/false whether to deploy the image scanning on ECS running images | `bool` | `false` | no |
105105
| <a name="input_name"></a> [name](#input\_name) | Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances | `string` | `"sfc"` | no |
106106
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags. always include 'product' default tag for resource-group proper functioning | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
107+
| <a name="input_use_standalone_scanner"></a> [use\_standalone\_scanner](#input\_use\_standalone\_scanner) | true/false whether use inline scanner or not | `bool` | `false` | no |
107108

108109
## Outputs
109110

examples/single-account-apprunner/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
locals {
2-
deploy_image_scanning = var.deploy_image_scanning_ecr || var.deploy_image_scanning_ecs
3-
deploy_scanning_infra = local.deploy_image_scanning && !var.use_standalone_scanner
2+
deploy_image_scanning = var.deploy_image_scanning_ecr || var.deploy_image_scanning_ecs
3+
deploy_scanning_infra = local.deploy_image_scanning && !var.use_standalone_scanner
44
}
55

66
#-------------------------------------
@@ -30,7 +30,7 @@ module "codebuild" {
3030
name = "${var.name}-codebuild"
3131
secure_api_token_secret_name = module.ssm.secure_api_token_secret_name
3232

33-
tags = var.tags
33+
tags = var.tags
3434
# note. this is required to avoid race conditions
3535
depends_on = [module.ssm]
3636
}

examples/single-account-ecs/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,7 @@ $ terraform apply
110110
| <a name="input_ecs_vpc_subnets_private_ids"></a> [ecs\_vpc\_subnets\_private\_ids](#input\_ecs\_vpc\_subnets\_private\_ids) | List of VPC subnets where workload is to be deployed. Defaulted to be created when 'ecs\_cluster\_name' is not provided. | `list(string)` | `[]` | no |
111111
| <a name="input_name"></a> [name](#input\_name) | Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances | `string` | `"sfc"` | no |
112112
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags. always include 'product' default tag for resource-group proper functioning | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
113+
| <a name="input_use_standalone_scanner"></a> [use\_standalone\_scanner](#input\_use\_standalone\_scanner) | true/false whether use inline scanner or not | `bool` | `false` | no |
113114

114115
## Outputs
115116

examples/single-account-ecs/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
locals {
2-
deploy_image_scanning = var.deploy_image_scanning_ecr || var.deploy_image_scanning_ecs
3-
deploy_scanning_infra = local.deploy_image_scanning && !var.use_standalone_scanner
2+
deploy_image_scanning = var.deploy_image_scanning_ecr || var.deploy_image_scanning_ecs
3+
deploy_scanning_infra = local.deploy_image_scanning && !var.use_standalone_scanner
44
}
55
#-------------------------------------
66
# general resources
@@ -31,7 +31,7 @@ module "codebuild" {
3131
name = "${var.name}-codebuild"
3232
secure_api_token_secret_name = module.ssm.secure_api_token_secret_name
3333

34-
tags = var.tags
34+
tags = var.tags
3535
# note. this is required to avoid racing conditions
3636
depends_on = [module.ssm]
3737
}

examples/single-account-k8s/README.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,8 +84,8 @@ $ terraform apply
8484

8585
| Name | Version |
8686
|------|---------|
87-
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.18.0 |
88-
| <a name="provider_helm"></a> [helm](#provider\_helm) | 2.5.1 |
87+
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.19.0 |
88+
| <a name="provider_helm"></a> [helm](#provider\_helm) | 2.6.0 |
8989
| <a name="provider_sysdig"></a> [sysdig](#provider\_sysdig) | 0.5.37 |
9090

9191
## Modules
@@ -121,6 +121,7 @@ $ terraform apply
121121
| <a name="input_deploy_image_scanning_ecs"></a> [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs) | true/false whether to deploy the image scanning on ECS running images | `bool` | `false` | no |
122122
| <a name="input_name"></a> [name](#input\_name) | Name to be assigned to all child resources. A suffix may be added internally when required. Use default value unless you need to install multiple instances | `string` | `"sfc"` | no |
123123
| <a name="input_tags"></a> [tags](#input\_tags) | sysdig secure-for-cloud tags. always include 'product' default tag for resource-group proper functioning | `map(string)` | <pre>{<br> "product": "sysdig-secure-for-cloud"<br>}</pre> | no |
124+
| <a name="input_use_standalone_scanner"></a> [use\_standalone\_scanner](#input\_use\_standalone\_scanner) | true/false whether use inline scanner or not | `bool` | `false` | no |
124125

125126
## Outputs
126127

examples/single-account-k8s/cloud-connector.tf

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ module "codebuild" {
2525
name = var.name
2626
secure_api_token_secret_name = module.ssm.secure_api_token_secret_name
2727

28-
tags = var.tags
28+
tags = var.tags
2929
# note. this is required to avoid race conditions
3030
depends_on = [module.ssm]
3131
}
@@ -71,37 +71,37 @@ resource "helm_release" "cloud_connector" {
7171
value = "terraform_aws_k8s_single"
7272
}
7373

74-
values = [
74+
values = [
7575
yamlencode({
76-
logging = "info"
77-
rules = []
76+
logging = "info"
77+
rules = []
7878
ingestors = [
7979
{
8080
cloudtrail-sns-sqs = {
8181
queueURL = module.cloud_connector_sqs.cloudtrail_sns_subscribed_sqs_url
8282
}
8383
}
8484
]
85-
scanners = local.deploy_image_scanning ? [
85+
scanners = local.deploy_image_scanning ? [
8686
merge(
87-
local.ecr_scanning_with_infra ? {
88-
aws-ecr = {
89-
codeBuildProject = module.codebuild[0].project_name
90-
secureAPITokenSecretName = module.ssm.secure_api_token_secret_name
91-
}
92-
} : {},
93-
local.ecs_scanning_with_infra ? {
94-
aws-ecs = {
95-
codeBuildProject = module.codebuild[0].project_name
96-
secureAPITokenSecretName = module.ssm.secure_api_token_secret_name
97-
}
98-
} : {},
99-
local.ecr_standalone_scanning ? {
100-
aws-ecr-inline = {},
101-
} : {},
102-
local.ecs_standalone_scanning ? {
103-
aws-ecs-inline = {},
104-
} : {},
87+
local.ecr_scanning_with_infra ? {
88+
aws-ecr = {
89+
codeBuildProject = module.codebuild[0].project_name
90+
secureAPITokenSecretName = module.ssm.secure_api_token_secret_name
91+
}
92+
} : {},
93+
local.ecs_scanning_with_infra ? {
94+
aws-ecs = {
95+
codeBuildProject = module.codebuild[0].project_name
96+
secureAPITokenSecretName = module.ssm.secure_api_token_secret_name
97+
}
98+
} : {},
99+
local.ecr_standalone_scanning ? {
100+
aws-ecr-inline = {},
101+
} : {},
102+
local.ecs_standalone_scanning ? {
103+
aws-ecs-inline = {},
104+
} : {},
105105
)
106106
] : []
107107
})

examples/single-account-k8s/credentials.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ module "iam_user" {
22
source = "../../modules/infrastructure/permissions/iam-user"
33
name = var.name
44

5-
deploy_image_scanning = local.deploy_image_scanning
5+
deploy_image_scanning = local.deploy_image_scanning
66
use_standalone_scanner = var.use_standalone_scanner
77

88
ssm_secure_api_token_arn = module.ssm.secure_api_token_secret_arn

examples/trigger-events/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ $ terraform apply
4949

5050
| Name | Version |
5151
|------|---------|
52-
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.18.0 |
52+
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.19.0 |
5353

5454
## Modules
5555

0 commit comments

Comments
 (0)