Skip to content

Commit

Permalink
cztack release 0.11.0
Browse files Browse the repository at this point in the history
  • Loading branch information
ryanking authored and czimergebot committed Jul 30, 2018
1 parent e6d6574 commit 866dd70
Show file tree
Hide file tree
Showing 12 changed files with 19 additions and 12 deletions.
7 changes: 7 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
# Changelog

## 0.11.0 2018-07-30

Initial release of open source modules. Number is kept in-sync with internal repo.

Currently moved to this repo are all our IAM and secrets modules.
4 changes: 2 additions & 2 deletions aws-default-vpc-security/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ This module will name, tag and optionally lock down traffic to AWS Default VPCs.

```hcl
module "default-vpc" {
source = "github.com/chanzuckerberg/cztack/aws-default-vpc-lockdown?ref=master # TODO
source = "github.com/chanzuckerberg/cztack/aws-default-vpc-lockdown?ref=master"
default_sg_lockdown = true
}
Expand All @@ -22,7 +22,7 @@ provider "aws"{
}
module "default-vpc" {
source = "github.com/chanzuckerberg/cztack/aws-default-vpc-lockdown?ref=master # TODO
source = "github.com/chanzuckerberg/cztack/aws-default-vpc-lockdown?ref=master"
default_sg_lockdown = true
Expand Down
2 changes: 1 addition & 1 deletion aws-iam-ecs-task-role/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ This will create a role for attaching to an ECS task, using `policy`.

```hcl
module "ecs-role" {
source = "github.com/chanzuckerberg/cztack/aws-iam-ecs-task-role?ref=master" # FIXME
source = "github.com/chanzuckerberg/cztack/aws-iam-ecs-task-role?ref=v0.11.0"
policy = "..."
Expand Down
2 changes: 1 addition & 1 deletion aws-iam-group-assume-role/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ This module will create a group which has the right to assume a particular IAM r

```hcl
module "group" {
source = "github.com/chanzuckerberg/cztack/aws-iam-group-assume-role?ref=master" # FIXME
source = "github.com/chanzuckerberg/cztack/aws-iam-group-assume-role?ref=v0.11.0"
group_name = "…"
path = "…"
Expand Down
2 changes: 1 addition & 1 deletion aws-iam-group-console-login/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ This module will create an IAM group and grant access for its members to log int

```hcl
module "group" {
source = "github.com/chanzuckerberg/cztack/aws-iam-group-console-login?ref=master" # FIXME
source = "github.com/chanzuckerberg/cztack/aws-iam-group-console-login?ref=v0.11.0"
group_name = "…"
iam_path = "…"
Expand Down
2 changes: 1 addition & 1 deletion aws-iam-password-policy/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ This module is useful for setting a password policy on AWS IAM.

```hcl
module "password-policy" {
source = "github.com/chanzuckerberg/cztack/aws-iam-password-policy?ref=master" # FIXME
source = "github.com/chanzuckerberg/cztack/aws-iam-password-policy?ref=v0.11.0"
}
```

Expand Down
2 changes: 1 addition & 1 deletion aws-iam-policy-cwlogs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ This will create a policy that allows writing to cloudwatch logs and attach it t

```hcl
module "policy" {
source = "github.com/chanzuckerberg/cztack/aws-iam-policy-cwlogs?ref=master" # FIXME
source = "github.com/chanzuckerberg/cztack/aws-iam-policy-cwlogs?ref=v0.11.0"
iam_path = "…"
Expand Down
2 changes: 1 addition & 1 deletion aws-iam-role-poweruser/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ This creates a role, `role_name` which is assumable from the account `source_acc

```hcl
module "group" {
source = "github.com/chanzuckerberg/cztack/aws-iam-role-poweruser?ref=master" # FIXME
source = "github.com/chanzuckerberg/cztack/aws-iam-role-poweruser?ref=v0.11.0"
role_name = "…" # defaults to "poweruser"
source_account_id = "…"
Expand Down
2 changes: 1 addition & 1 deletion aws-iam-role-readonly/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ This will create a readonly role, assumeable from `source_account_id`.

```hcl
module "role" {
source = "github.com/chanzuckerberg/cztack/aws-iam-role-readonly?ref=master" # FIXME
source = "github.com/chanzuckerberg/cztack/aws-iam-role-readonly?ref=v0.11.0"
source_account_id = "…"
}
Expand Down
2 changes: 1 addition & 1 deletion aws-iam-role-security-audit/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ This will create a role for doing security audits, assumeable from `source_accou

```hcl
module "group" {
source = "github.com/chanzuckerberg/cztack/aws-iam-group-assume-role?ref=master" # FIXME
source = "github.com/chanzuckerberg/cztack/aws-iam-group-assume-role?ref=v0.11.0"
source_account_id = "…"
}
Expand Down
2 changes: 1 addition & 1 deletion aws-param-secret/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ You can use [our secrets setup module](../aws-param-secrets-setup/README.md) to

```hcl
module "secret" {
source = "github.com/chanzuckerberg/cztack/aws-param-secret?ref=master" # TODO fix
source = "github.com/chanzuckerberg/cztack/aws-param-secret?ref=v0.11.0"
project = "acme"
env = "staging"
Expand Down
2 changes: 1 addition & 1 deletion module-template/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

```hcl
module "group" {
source = "github.com/chanzuckerberg/cztack/…?ref=master" # FIXME
source = "github.com/chanzuckerberg/cztack/…?ref=v0.11.0"
}
output "…" {
Expand Down

0 comments on commit 866dd70

Please sign in to comment.