From dbfee2b47a377382171d17bc0711b6670be2ff45 Mon Sep 17 00:00:00 2001 From: jakemulley Date: Tue, 9 May 2023 09:59:07 +0100 Subject: [PATCH] Bump example version --- examples/ecr.tf | 13 ++++--------- 1 file changed, 4 insertions(+), 9 deletions(-) diff --git a/examples/ecr.tf b/examples/ecr.tf index f4fab14..0040c3e 100644 --- a/examples/ecr.tf +++ b/examples/ecr.tf @@ -5,18 +5,10 @@ * */ module "ecr_credentials" { - source = "github.com/ministryofjustice/cloud-platform-terraform-ecr-credentials?ref=5.0" + source = "github.com/ministryofjustice/cloud-platform-terraform-ecr-credentials?ref=5.1.4" team_name = var.team_name repo_name = "${var.namespace}-ecr" - /* - By default scan_on_push is set to true. When this is enabled then all images pushed to the repo are scanned for any security - / software vulnerabilities in your image and the results can be viewed in the console. For further details, please see: - https://docs.aws.amazon.com/AmazonECR/latest/userguide/image-scanning.html - To disable 'scan_on_push', set it to false as below: - scan_on_push = "false" - */ - # Uncomment and provide repository names to create github actions secrets # containing the ECR name, AWS access key, and AWS secret key, for use in # github actions CI/CD pipelines @@ -26,6 +18,9 @@ module "ecr_credentials" { # https://docs.github.com/en/actions/deployment/targeting-different-environments/using-environments-for-deployment#environment-secrets # github_environments = ["my-environment"] + # Uncomment to configure OIDC for GitHub Actions rather than using access keys + # oidc_providers = ["github"] + /* # Lifecycle_policy provides a way to automate the cleaning up of your container images by expiring images based on age or count. # To apply multiple rules, combined them in one policy JSON.