The Wayback Machine - https://web.archive.org/web/20210824013115/https://github.com/topics/infrastructure-as-code
Skip to content
#

infrastructure-as-code

Here are 1,187 public repositories matching this topic...

jouve
jouve commented Jun 3, 2021

Description

let's say I have an apache process group I want to control.

  • when using supervisord.running, the name must be apache:* (which is the same notation used by supervisor)
  • when using supervisord.dead, the name must be apache: (without the *)

As both states mirror each other, I expect them to use the same convention for name, the one from running since it

knqyf263
knqyf263 commented Oct 19, 2020

Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g. rake.gemspec has the information about rake.

To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*

rareelement
rareelement commented Aug 11, 2021

We have two CDK applications:

  • Application A bootstrapped with CDK v1.80 or so, with newStyleStackSynthesis manually set to true, eventually upgraded to CDK version 1.108.0 (template version 6)
  • Application B, created using cdk init app shell command (cdk version 1.117.0), newStyleStackSynthesis flag is missing from automatically generated cdk.json file.

The bootstrapping process fro

infracost
alikhajeh1
alikhajeh1 commented Jul 28, 2021

Running infracost breakdown --config-file infracost.yml --terraform-workspace=ali-test correctly shows:

Error: --config-file flag cannot be used with the following flags: --path, --terraform-*, --usage-file

Our help text mentions the same thing:
      --config-file string            Path to Infracost config file. Cannot be used with path, terraform* or usage-file flags

However,

ejohn20
ejohn20 commented Aug 19, 2021

Uploading the SARIF formatted output to the GH repo fails. It does not appear to be valid SARIF according to the parser. Using the github/codeql-action/upload-sarif@v1 produces an error message with invalid data.

To Reproduce
Steps to reproduce the behavior:

  1. Create a GH Action with the following steps to run the checkov scan and generate a checkov.sarif results file:
- name
terrascan
adegoodyer
adegoodyer commented Aug 11, 2021
  • terrascan version: 1.9.0
  • terraform version: 1.0.1

Enhancement Request

Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.

Extremely useful when running the tool without halting a pipeline for example.

I currently use a workaround, but something more concrete would be very desira

anguslees
anguslees commented Mar 21, 2018

Garbage collection works by listing everything with the gc-tag. In a busy cluster, we really want that filter to happen server-side and ideally using an index of some sort.

That means we should use a Kubernetes label, not an annotation.

I think this will require a two-step migration plan (write both but continue to read annotation; release; drop support for annotation; release).

Improve this page

Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."

Learn more