Skip to content

Commit

Permalink
Merge pull request #58 from Pwd9000-ML/dependabot/github_actions/terr…
Browse files Browse the repository at this point in the history
…aform-docs/gh-actions-1.3.0

Bump terraform-docs/gh-actions from 1.2.2 to 1.3.0
  • Loading branch information
Pwd9000-ML authored Dec 27, 2024
2 parents 2de6278 + 1b1a0c3 commit 4f9b2a8
Show file tree
Hide file tree
Showing 7 changed files with 14 additions and 14 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/dependency-tests.yml
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ jobs:
ref: ${{ github.event.pull_request.head.ref }}

- name: Render terraform docs inside the README.md and push changes back to PR branch
uses: terraform-docs/gh-actions@v1.2.2
uses: terraform-docs/gh-actions@v1.3.0
with:
find-dir: .
output-file: README.md
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/manual-test-release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ jobs:
run: git pull origin master

- name: Render terraform docs inside the README.md and push changes back to PR branch
uses: terraform-docs/gh-actions@v1.2.2
uses: terraform-docs/gh-actions@v1.3.0
with:
find-dir: .
output-file: README.md
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ No modules.

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_azure_rbac_config"></a> [azure\_rbac\_config](#input\_azure\_rbac\_config) | Azure RBAC role assignment (permissions) configuration. | <pre>list(object({<br> description = string<br> scope = string<br> role_definition_name = string<br> principal_id = string<br> }))</pre> | <pre>[<br> {<br> "description": "Example - Azure RBAC permision on Subscription",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Resource Group",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Resource",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Management Group",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/providers/Microsoft.Management/managementGroups/myMG"<br> }<br>]</pre> | no |
| <a name="input_azure_rbac_config"></a> [azure\_rbac\_config](#input\_azure\_rbac\_config) | Azure RBAC role assignment (permissions) configuration. | <pre>list(object({<br/> description = string<br/> scope = string<br/> role_definition_name = string<br/> principal_id = string<br/> }))</pre> | <pre>[<br/> {<br/> "description": "Example - Azure RBAC permision on Subscription",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Resource Group",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Resource",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Management Group",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/providers/Microsoft.Management/managementGroups/myMG"<br/> }<br/>]</pre> | no |

## Outputs

Expand Down
4 changes: 2 additions & 2 deletions examples/azure_rbac_exising_resources/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,8 +57,8 @@ No requirements.
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_aadGroup"></a> [aadGroup](#input\_aadGroup) | The name of the AAD group that will be created. | `string` | `"AAD-group-to-create"` | no |
| <a name="input_azure_rbac_config"></a> [azure\_rbac\_config](#input\_azure\_rbac\_config) | Azure RBAC permision configuration | <pre>list(object({<br> description = string<br> scope = string<br> role_definition_name = string<br> principal_id = string<br> }))</pre> | <pre>[<br> {<br> "description": "Example - Azure RBAC permision on Subscription",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Resource Group",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Resource",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Management Group",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/providers/Microsoft.Management/managementGroups/myMG"<br> }<br>]</pre> | no |
| <a name="input_groupOwners"></a> [groupOwners](#input\_groupOwners) | The names of the of the users that will be added as owners to the AD groups. | `list(string)` | <pre>[<br> "aadGroupOwner@company.com"<br>]</pre> | no |
| <a name="input_azure_rbac_config"></a> [azure\_rbac\_config](#input\_azure\_rbac\_config) | Azure RBAC permision configuration | <pre>list(object({<br/> description = string<br/> scope = string<br/> role_definition_name = string<br/> principal_id = string<br/> }))</pre> | <pre>[<br/> {<br/> "description": "Example - Azure RBAC permision on Subscription",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Resource Group",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Resource",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Management Group",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/providers/Microsoft.Management/managementGroups/myMG"<br/> }<br/>]</pre> | no |
| <a name="input_groupOwners"></a> [groupOwners](#input\_groupOwners) | The names of the of the users that will be added as owners to the AD groups. | `list(string)` | <pre>[<br/> "aadGroupOwner@company.com"<br/>]</pre> | no |
| <a name="input_keyVaultName"></a> [keyVaultName](#input\_keyVaultName) | Name of the key vault. | `string` | `"existing-kv-name"` | no |
| <a name="input_resourceGroupName"></a> [resourceGroupName](#input\_resourceGroupName) | Name of the resource group where resources are hosted. | `string` | `"existing-rg-name"` | no |
Expand Down
8 changes: 4 additions & 4 deletions examples/azure_rbac_new_resources/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,12 +55,12 @@ No requirements.
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_azure_rbac_config"></a> [azure\_rbac\_config](#input\_azure\_rbac\_config) | Azure RBAC permision configuration | <pre>list(object({<br> description = string<br> scope = string<br> role_definition_name = string<br> principal_id = string<br> }))</pre> | <pre>[<br> {<br> "description": "Example - Azure RBAC permision on Subscription",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Resource Group",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Resource",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Management Group",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/providers/Microsoft.Management/managementGroups/myMG"<br> }<br>]</pre> | no |
| <a name="input_kv_config"></a> [kv\_config](#input\_kv\_config) | Key Vault configuration object to create azure key vault. | <pre>object({<br> name = string<br> sku = string<br> })</pre> | <pre>{<br> "name": "rbactestkv",<br> "sku": "standard"<br>}</pre> | no |
| <a name="input_kv_net_rules"></a> [kv\_net\_rules](#input\_kv\_net\_rules) | n/a | <pre>list(object({<br> default_action = string<br> bypass = string<br> ip_rules = list(string)<br> virtual_network_subnet_ids = list(string)<br> }))</pre> | <pre>[<br> {<br> "bypass": "AzureServices",<br> "default_action": "Deny",<br> "ip_rules": [<br> "0.0.0.0/0"<br> ],<br> "virtual_network_subnet_ids": []<br> }<br>]</pre> | no |
| <a name="input_azure_rbac_config"></a> [azure\_rbac\_config](#input\_azure\_rbac\_config) | Azure RBAC permision configuration | <pre>list(object({<br/> description = string<br/> scope = string<br/> role_definition_name = string<br/> principal_id = string<br/> }))</pre> | <pre>[<br/> {<br/> "description": "Example - Azure RBAC permision on Subscription",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Resource Group",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Resource",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Management Group",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/providers/Microsoft.Management/managementGroups/myMG"<br/> }<br/>]</pre> | no |
| <a name="input_kv_config"></a> [kv\_config](#input\_kv\_config) | Key Vault configuration object to create azure key vault. | <pre>object({<br/> name = string<br/> sku = string<br/> })</pre> | <pre>{<br/> "name": "rbactestkv",<br/> "sku": "standard"<br/>}</pre> | no |
| <a name="input_kv_net_rules"></a> [kv\_net\_rules](#input\_kv\_net\_rules) | n/a | <pre>list(object({<br/> default_action = string<br/> bypass = string<br/> ip_rules = list(string)<br/> virtual_network_subnet_ids = list(string)<br/> }))</pre> | <pre>[<br/> {<br/> "bypass": "AzureServices",<br/> "default_action": "Deny",<br/> "ip_rules": [<br/> "0.0.0.0/0"<br/> ],<br/> "virtual_network_subnet_ids": []<br/> }<br/>]</pre> | no |
| <a name="input_location"></a> [location](#input\_location) | Azure region to deploy resources to. | `string` | `"uksouth"` | no |
| <a name="input_resource_group_name"></a> [resource\_group\_name](#input\_resource\_group\_name) | Name of the resource group where resources will be hosted. | `string` | `"resource-group-name-to-create"` | no |
| <a name="input_tags"></a> [tags](#input\_tags) | A map of key value pairs that is used to tag resources created. | `map(string)` | <pre>{<br> "Author": "Marcel Lupo",<br> "Description": "Automated test for RBAC administration module.",<br> "GitHub": "https://registry.terraform.io/modules/Pwd9000-ML/rbac-administration/azurerm/latest",<br> "Terraform": "True"<br>}</pre> | no |
| <a name="input_tags"></a> [tags](#input\_tags) | A map of key value pairs that is used to tag resources created. | `map(string)` | <pre>{<br/> "Author": "Marcel Lupo",<br/> "Description": "Automated test for RBAC administration module.",<br/> "GitHub": "https://registry.terraform.io/modules/Pwd9000-ML/rbac-administration/azurerm/latest",<br/> "Terraform": "True"<br/>}</pre> | no |
## Outputs
Expand Down
8 changes: 4 additions & 4 deletions tests/auto_test1/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,12 +33,12 @@ No requirements.

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_azure_rbac_config"></a> [azure\_rbac\_config](#input\_azure\_rbac\_config) | Azure RBAC permision configuration | <pre>list(object({<br> description = string<br> scope = string<br> role_definition_name = string<br> principal_id = string<br> }))</pre> | <pre>[<br> {<br> "description": "Example - Azure RBAC permision on Subscription",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Resource Group",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Resource",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM"<br> },<br> {<br> "description": "Example - Azure RBAC permision on Management Group",<br> "principal_id": "00000000-0000-0000-0000-000000000000",<br> "role_definition_name": "Contributor",<br> "scope": "/providers/Microsoft.Management/managementGroups/myMG"<br> }<br>]</pre> | no |
| <a name="input_kv_config"></a> [kv\_config](#input\_kv\_config) | Key Vault configuration object to create azure key vault. | <pre>object({<br> name = string<br> sku = string<br> })</pre> | <pre>{<br> "name": "rbactestkv",<br> "sku": "standard"<br>}</pre> | no |
| <a name="input_kv_net_rules"></a> [kv\_net\_rules](#input\_kv\_net\_rules) | n/a | <pre>list(object({<br> default_action = string<br> bypass = string<br> ip_rules = list(string)<br> virtual_network_subnet_ids = list(string)<br> }))</pre> | <pre>[<br> {<br> "bypass": "AzureServices",<br> "default_action": "Deny",<br> "ip_rules": [<br> "0.0.0.0/0"<br> ],<br> "virtual_network_subnet_ids": []<br> }<br>]</pre> | no |
| <a name="input_azure_rbac_config"></a> [azure\_rbac\_config](#input\_azure\_rbac\_config) | Azure RBAC permision configuration | <pre>list(object({<br/> description = string<br/> scope = string<br/> role_definition_name = string<br/> principal_id = string<br/> }))</pre> | <pre>[<br/> {<br/> "description": "Example - Azure RBAC permision on Subscription",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Resource Group",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Resource",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM"<br/> },<br/> {<br/> "description": "Example - Azure RBAC permision on Management Group",<br/> "principal_id": "00000000-0000-0000-0000-000000000000",<br/> "role_definition_name": "Contributor",<br/> "scope": "/providers/Microsoft.Management/managementGroups/myMG"<br/> }<br/>]</pre> | no |
| <a name="input_kv_config"></a> [kv\_config](#input\_kv\_config) | Key Vault configuration object to create azure key vault. | <pre>object({<br/> name = string<br/> sku = string<br/> })</pre> | <pre>{<br/> "name": "rbactestkv",<br/> "sku": "standard"<br/>}</pre> | no |
| <a name="input_kv_net_rules"></a> [kv\_net\_rules](#input\_kv\_net\_rules) | n/a | <pre>list(object({<br/> default_action = string<br/> bypass = string<br/> ip_rules = list(string)<br/> virtual_network_subnet_ids = list(string)<br/> }))</pre> | <pre>[<br/> {<br/> "bypass": "AzureServices",<br/> "default_action": "Deny",<br/> "ip_rules": [<br/> "0.0.0.0/0"<br/> ],<br/> "virtual_network_subnet_ids": []<br/> }<br/>]</pre> | no |
| <a name="input_location"></a> [location](#input\_location) | Azure region to deploy resources to. | `string` | `"uksouth"` | no |
| <a name="input_resource_group_name"></a> [resource\_group\_name](#input\_resource\_group\_name) | Name of the resource group where resources will be hosted. | `string` | n/a | yes |
| <a name="input_tags"></a> [tags](#input\_tags) | A map of key value pairs that is used to tag resources created. | `map(string)` | <pre>{<br> "Author": "Marcel Lupo",<br> "Description": "Automated test for RBAC administration module.",<br> "GitHub": "https://registry.terraform.io/modules/Pwd9000-ML/rbac-administration/azurerm/latest",<br> "Terraform": "True"<br>}</pre> | no |
| <a name="input_tags"></a> [tags](#input\_tags) | A map of key value pairs that is used to tag resources created. | `map(string)` | <pre>{<br/> "Author": "Marcel Lupo",<br/> "Description": "Automated test for RBAC administration module.",<br/> "GitHub": "https://registry.terraform.io/modules/Pwd9000-ML/rbac-administration/azurerm/latest",<br/> "Terraform": "True"<br/>}</pre> | no |

## Outputs

Expand Down
Loading

0 comments on commit 4f9b2a8

Please sign in to comment.