infrastructure-as-code
Here are 1,187 public repositories matching this topic...
[BUG] inconsistent behaviour between supervisord.running and supervisord.dead for process groups
Description
let's say I have an apache process group I want to control.
- when using
supervisord.running, thenamemust beapache:*(which is the same notation used by supervisor) - when using
supervisord.dead, thenamemust beapache:(without the*)
As both states mirror each other, I expect them to use the same convention for name, the one from running since it
-
Updated
Aug 24, 2021 - Go
Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g. rake.gemspec has the information about rake.
To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*
We have two CDK applications:
- Application A bootstrapped with CDK v1.80 or so, with newStyleStackSynthesis manually set to true, eventually upgraded to CDK version 1.108.0 (template version 6)
- Application B, created using cdk init app shell command (cdk version 1.117.0), newStyleStackSynthesis flag is missing from automatically generated cdk.json file.
The bootstrapping process fro
-
Updated
Aug 23, 2021 - Java
-
Updated
Aug 23, 2021 - Go
-
Updated
Aug 21, 2021 - Go
Running infracost breakdown --config-file infracost.yml --terraform-workspace=ali-test correctly shows:
Error: --config-file flag cannot be used with the following flags: --path, --terraform-*, --usage-file
Our help text mentions the same thing:
--config-file string Path to Infracost config file. Cannot be used with path, terraform* or usage-file flags
However,
-
Updated
Aug 23, 2021 - Go
Uploading the SARIF formatted output to the GH repo fails. It does not appear to be valid SARIF according to the parser. Using the github/codeql-action/upload-sarif@v1 produces an error message with invalid data.
To Reproduce
Steps to reproduce the behavior:
- Create a GH Action with the following steps to run the checkov scan and generate a
checkov.sarifresults file:
- name
-
Updated
Aug 16, 2021
-
Updated
Aug 24, 2021 - Python
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
Aug 17, 2021 - Go
-
Updated
Jul 4, 2021 - Python
-
Updated
May 16, 2021
-
Updated
Aug 3, 2021 - JavaScript
Copilot doesn't seem to have correct error behavior when I try to create a Scheduled Job with the same name as an existing service.
For example, in my app right now I have the following:
❯ copilot svc ls
Name Type
---- ----
fe Load Balanced Web Service
I can see this in SSM:
❯ aws ssm get-parameter --name /copilot/applicatio
Description
To complete #554, it can make sense to add resource source details for missing resources
Example
Follow pull-request attached to issues #874 #875 #876 for examples of implementation
-
Updated
Aug 19, 2021 - Go
-
Updated
Aug 13, 2021 - JavaScript
-
Updated
Sep 30, 2020 - Go
-
Updated
Aug 8, 2021 - HCL
-
Updated
May 8, 2021 - Markdown
-
Updated
Mar 14, 2021 - Ruby
-
Updated
Feb 27, 2018 - HCL
Garbage collection works by listing everything with the gc-tag. In a busy cluster, we really want that filter to happen server-side and ideally using an index of some sort.
That means we should use a Kubernetes label, not an annotation.
I think this will require a two-step migration plan (write both but continue to read annotation; release; drop support for annotation; release).
-
Updated
Apr 6, 2021 - HCL
-
Updated
Aug 23, 2021 - Shell
Improve this page
Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."


