Skip to content

Commit

Permalink
Merge pull request #524 from ministryofjustice/dependabot/github_acti…
Browse files Browse the repository at this point in the history
…ons/terraform-docs/gh-actions-1.3.0

Bump terraform-docs/gh-actions from 1.2.2 to 1.3.0
  • Loading branch information
SteveLinden authored Sep 20, 2024
2 parents 9949015 + 5666c67 commit b9b6d04
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/documentation.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ jobs:
ref: ${{ github.event.pull_request.head.ref }}

- name: Render terraform docs and push changes back to PR
uses: terraform-docs/gh-actions@cca78c27ac9e2b6545debf2ecae9df930fd3461c # v1.2.2
uses: terraform-docs/gh-actions@aeae0038ed47a547e0c0fca5c059d3335f48fb25 # v1.3.0
with:
working-dir: .
output-file: README.md
Expand Down
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -269,7 +269,7 @@ If you're looking to raise an issue with this module, please create a new issue
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_access_logs"></a> [access\_logs](#input\_access\_logs) | A boolean that determines whether to have access logs | `bool` | `true` | no |
| <a name="input_access_logs_lifecycle_rule"></a> [access\_logs\_lifecycle\_rule](#input\_access\_logs\_lifecycle\_rule) | Custom lifecycle rule to override the default one | <pre>list(object({<br> id = string<br> enabled = string<br> prefix = string<br> tags = map(string)<br> transition = list(object({<br> days = number<br> storage_class = string<br> }))<br> expiration = object({<br> days = number<br> })<br> noncurrent_version_transition = list(object({<br> days = number<br> storage_class = string<br> }))<br> noncurrent_version_expiration = object({<br> days = number<br> })<br> }))</pre> | <pre>[<br> {<br> "enabled": "Enabled",<br> "expiration": {<br> "days": 730<br> },<br> "id": "main",<br> "noncurrent_version_expiration": {<br> "days": 730<br> },<br> "noncurrent_version_transition": [<br> {<br> "days": 90,<br> "storage_class": "STANDARD_IA"<br> },<br> {<br> "days": 365,<br> "storage_class": "GLACIER"<br> }<br> ],<br> "prefix": "",<br> "tags": {<br> "autoclean": "true",<br> "rule": "log"<br> },<br> "transition": [<br> {<br> "days": 90,<br> "storage_class": "STANDARD_IA"<br> },<br> {<br> "days": 365,<br> "storage_class": "GLACIER"<br> }<br> ]<br> }<br>]</pre> | no |
| <a name="input_access_logs_lifecycle_rule"></a> [access\_logs\_lifecycle\_rule](#input\_access\_logs\_lifecycle\_rule) | Custom lifecycle rule to override the default one | <pre>list(object({<br/> id = string<br/> enabled = string<br/> prefix = string<br/> tags = map(string)<br/> transition = list(object({<br/> days = number<br/> storage_class = string<br/> }))<br/> expiration = object({<br/> days = number<br/> })<br/> noncurrent_version_transition = list(object({<br/> days = number<br/> storage_class = string<br/> }))<br/> noncurrent_version_expiration = object({<br/> days = number<br/> })<br/> }))</pre> | <pre>[<br/> {<br/> "enabled": "Enabled",<br/> "expiration": {<br/> "days": 730<br/> },<br/> "id": "main",<br/> "noncurrent_version_expiration": {<br/> "days": 730<br/> },<br/> "noncurrent_version_transition": [<br/> {<br/> "days": 90,<br/> "storage_class": "STANDARD_IA"<br/> },<br/> {<br/> "days": 365,<br/> "storage_class": "GLACIER"<br/> }<br/> ],<br/> "prefix": "",<br/> "tags": {<br/> "autoclean": "true",<br/> "rule": "log"<br/> },<br/> "transition": [<br/> {<br/> "days": 90,<br/> "storage_class": "STANDARD_IA"<br/> },<br/> {<br/> "days": 365,<br/> "storage_class": "GLACIER"<br/> }<br/> ]<br/> }<br/>]</pre> | no |
| <a name="input_account_number"></a> [account\_number](#input\_account\_number) | Account number of current environment | `string` | n/a | yes |
| <a name="input_application_name"></a> [application\_name](#input\_application\_name) | Name of application | `string` | n/a | yes |
| <a name="input_dns_record_client_routing_policy"></a> [dns\_record\_client\_routing\_policy](#input\_dns\_record\_client\_routing\_policy) | (optional) Indicates how traffic is distributed among network load balancer Availability Zones only. Possible values are any\_availability\_zone (client DNS queries are resolved among healthy LB IP addresses across all LB Availability Zones), partial\_availability\_zone\_affinity (85 percent of client DNS queries will favor load balancer IP addresses in their own Availability Zone, while the remaining queries resolve to any healthy zone) and availability\_zone\_affinity (Client DNS queries will favor load balancer IP address in their own Availability Zone). | `string` | `"any_availability_zone"` | no |
Expand All @@ -279,10 +279,10 @@ If you're looking to raise an issue with this module, please create a new issue
| <a name="input_force_destroy_bucket"></a> [force\_destroy\_bucket](#input\_force\_destroy\_bucket) | A boolean that indicates all objects (including any locked objects) should be deleted from the bucket so that the bucket can be destroyed without error. These objects are not recoverable. | `bool` | `false` | no |
| <a name="input_idle_timeout"></a> [idle\_timeout](#input\_idle\_timeout) | The time in seconds that the connection is allowed to be idle. | `string` | `null` | no |
| <a name="input_internal_lb"></a> [internal\_lb](#input\_internal\_lb) | A boolean that determines whether the load balancer is internal or internet-facing. | `bool` | `false` | no |
| <a name="input_lb_target_groups"></a> [lb\_target\_groups](#input\_lb\_target\_groups) | Map of load balancer target groups, where key is the name | <pre>map(object({<br> port = optional(number)<br> attachment_port = optional(number)<br> deregistration_delay = optional(number)<br> health_check = optional(object({<br> enabled = optional(bool)<br> interval = optional(number)<br> healthy_threshold = optional(number)<br> matcher = optional(string)<br> path = optional(string)<br> port = optional(number)<br> timeout = optional(number)<br> unhealthy_threshold = optional(number)<br> }))<br> stickiness = optional(object({<br> enabled = optional(bool)<br> type = string<br> cookie_duration = optional(number)<br> cookie_name = optional(string)<br> }))<br> }))</pre> | `{}` | no |
| <a name="input_lb_target_groups"></a> [lb\_target\_groups](#input\_lb\_target\_groups) | Map of load balancer target groups, where key is the name | <pre>map(object({<br/> port = optional(number)<br/> attachment_port = optional(number)<br/> deregistration_delay = optional(number)<br/> health_check = optional(object({<br/> enabled = optional(bool)<br/> interval = optional(number)<br/> healthy_threshold = optional(number)<br/> matcher = optional(string)<br/> path = optional(string)<br/> port = optional(number)<br/> timeout = optional(number)<br/> unhealthy_threshold = optional(number)<br/> }))<br/> stickiness = optional(object({<br/> enabled = optional(bool)<br/> type = string<br/> cookie_duration = optional(number)<br/> cookie_name = optional(string)<br/> }))<br/> }))</pre> | `{}` | no |
| <a name="input_load_balancer_type"></a> [load\_balancer\_type](#input\_load\_balancer\_type) | application or network | `string` | `"application"` | no |
| <a name="input_loadbalancer_egress_rules"></a> [loadbalancer\_egress\_rules](#input\_loadbalancer\_egress\_rules) | Create new security group with these egress rules for the loadbalancer. Or use the security\_groups var to attach existing group(s) | <pre>map(object({<br> description = string<br> from_port = number<br> to_port = number<br> protocol = string<br> security_groups = list(string)<br> cidr_blocks = list(string)<br> }))</pre> | `{}` | no |
| <a name="input_loadbalancer_ingress_rules"></a> [loadbalancer\_ingress\_rules](#input\_loadbalancer\_ingress\_rules) | Create new security group with these ingress rules for the loadbalancer. Or use the security\_groups var to attach existing group(s) | <pre>map(object({<br> description = string<br> from_port = number<br> to_port = number<br> protocol = string<br> security_groups = list(string)<br> cidr_blocks = list(string)<br> }))</pre> | `{}` | no |
| <a name="input_loadbalancer_egress_rules"></a> [loadbalancer\_egress\_rules](#input\_loadbalancer\_egress\_rules) | Create new security group with these egress rules for the loadbalancer. Or use the security\_groups var to attach existing group(s) | <pre>map(object({<br/> description = string<br/> from_port = number<br/> to_port = number<br/> protocol = string<br/> security_groups = list(string)<br/> cidr_blocks = list(string)<br/> }))</pre> | `{}` | no |
| <a name="input_loadbalancer_ingress_rules"></a> [loadbalancer\_ingress\_rules](#input\_loadbalancer\_ingress\_rules) | Create new security group with these ingress rules for the loadbalancer. Or use the security\_groups var to attach existing group(s) | <pre>map(object({<br/> description = string<br/> from_port = number<br/> to_port = number<br/> protocol = string<br/> security_groups = list(string)<br/> cidr_blocks = list(string)<br/> }))</pre> | `{}` | no |
| <a name="input_public_subnets"></a> [public\_subnets](#input\_public\_subnets) | Badly named variable, use subnets instead. Keeping for backward compatibility | `list(string)` | `[]` | no |
| <a name="input_region"></a> [region](#input\_region) | AWS Region where resources are to be created | `string` | n/a | yes |
| <a name="input_s3_versioning"></a> [s3\_versioning](#input\_s3\_versioning) | A boolean that determines whether s3 will have versioning | `bool` | `true` | no |
Expand Down

0 comments on commit b9b6d04

Please sign in to comment.