From 38f2d6c7132e70c16e2dbd60f7b154840a28bd2a Mon Sep 17 00:00:00 2001 From: Nico Fischer Date: Fri, 14 Jan 2022 15:34:30 +0000 Subject: [PATCH] terraform 1.1.3 --- .drone.yml | 30 +++-- .gitignore | 1 + .terraform.lock.hcl | 40 +++++++ README.md | 176 ++++++++++++++++++++++++++---- provider.tf => __providers__._tf_ | 6 + main.tf | 6 +- versions.tf | 31 ++++++ 7 files changed, 254 insertions(+), 36 deletions(-) create mode 100644 .terraform.lock.hcl rename provider.tf => __providers__._tf_ (81%) create mode 100644 versions.tf diff --git a/.drone.yml b/.drone.yml index 57ba6ab..1aeb83d 100644 --- a/.drone.yml +++ b/.drone.yml @@ -1,7 +1,23 @@ -pipeline: - validate: - image: quay.io/ukhomeofficedigital/terraform-toolset:v0.12.6 - commands: - - /acp/scripts/tf-validate.sh --no-docs - when: - event: [pull_request, push] +--- +kind: pipeline +name: default +type: kubernetes + +platform: + os: linux + arch: amd64 + +steps: +- name: validate + pull: if-not-exists + image: quay.io/ukhomeofficedigital/terraform-toolset:v1.1.3-2 + commands: + - mv __providers__._tf_ providers.tf + - /acp/scripts/tf-validate.sh + - mv providers.tf __providers__._tf_ + when: + event: + - pull_request + - push + +... \ No newline at end of file diff --git a/.gitignore b/.gitignore index 3fa8c86..28af535 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1,2 @@ .terraform +providers.tf \ No newline at end of file diff --git a/.terraform.lock.hcl b/.terraform.lock.hcl new file mode 100644 index 0000000..d13c004 --- /dev/null +++ b/.terraform.lock.hcl @@ -0,0 +1,40 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/archive" { + version = "2.2.0" + constraints = "~> 2.2" + hashes = [ + "h1:CIWi5G6ob7p2wWoThRQbOB8AbmFlCzp7Ka81hR3cVp0=", + "zh:06bd875932288f235c16e2237142b493c2c2b6aba0e82e8c85068332a8d2a29e", + "zh:0c681b481372afcaefddacc7ccdf1d3bb3a0c0d4678a526bc8b02d0c331479bc", + "zh:100fc5b3fc01ea463533d7bbfb01cb7113947a969a4ec12e27f5b2be49884d6c", + "zh:55c0d7ddddbd0a46d57c51fcfa9b91f14eed081a45101dbfc7fd9d2278aa1403", + "zh:73a5dd68379119167934c48afa1101b09abad2deb436cd5c446733e705869d6b", + "zh:841fc4ac6dc3479981330974d44ad2341deada8a5ff9e3b1b4510702dfbdbed9", + "zh:91be62c9b41edb137f7f835491183628d484e9d6efa82fcb75cfa538c92791c5", + "zh:acd5f442bd88d67eb948b18dc2ed421c6c3faee62d3a12200e442bfff0aa7d8b", + "zh:ad5720da5524641ad718a565694821be5f61f68f1c3c5d2cfa24426b8e774bef", + "zh:e63f12ea938520b3f83634fc29da28d92eed5cfbc5cc8ca08281a6a9c36cca65", + "zh:f6542918faa115df46474a36aabb4c3899650bea036b5f8a5e296be6f8f25767", + ] +} + +provider "registry.terraform.io/hashicorp/aws" { + version = "3.72.0" + constraints = "~> 3.70" + hashes = [ + "h1:OH3yw9pasENmaAowGtukjSAGePqka6iKlBpWvviySoE=", + "zh:0c4615ff3c6bc9700d8f16a5a644ddfcb666eaddbf2f77d71616008a28e4db75", + "zh:29eb139a8fbb98391652fa1eb4668ad5a13a31d45a6c06fe2b1d66903c4e6509", + "zh:3e73a9cf67d30c400456011cc8ed036bce68df8fd8131d591a929186e43ab80b", + "zh:46090da59293464e1865190b2e67ae63103c9d87a16a5fcb982ce748369666d6", + "zh:4fb25d9b139cb1856e519bff4fd49695285fa63a1d57e1c0efc1791bb36532a8", + "zh:5acd99d2b22cd45f18c93905a6e5122712c48f432db3c3c3518af449c10ae7e6", + "zh:95e53770503127e6de9f71d02e0bafdf0c7e7490f93401e05b6015bc7fa94b29", + "zh:b31524932e804de5ef5613d3646892eb55656f062bcbb9d7c29cf6539f82397e", + "zh:d977b9f8657c3026340295015930ef58caba5c2f59fd2e63e230c0b9ddba1ee7", + "zh:fcb0202ad1b8de19f1cd58d0b60147cae5dd4f869a861f619e8e5d27f8a936a9", + "zh:fe85cf3c44834230c2aaa2d0c622ddde1e33398bbe9f7213011eba68130b1588", + ] +} diff --git a/README.md b/README.md index 21c834a..10a7fec 100644 --- a/README.md +++ b/README.md @@ -1,27 +1,155 @@ + +## Requirements + +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 1.0 | +| [archive](#requirement\_archive) | ~> 2.2 | +| [aws](#requirement\_aws) | ~> 3.70 | + +## Providers + +| Name | Version | +|------|---------| +| [archive](#provider\_archive) | 2.2.0 | +| [aws](#provider\_aws) | 3.72.0 | +| [aws.ap-northeast-1](#provider\_aws.ap-northeast-1) | 3.72.0 | +| [aws.ap-northeast-2](#provider\_aws.ap-northeast-2) | 3.72.0 | +| [aws.ap-south-1](#provider\_aws.ap-south-1) | 3.72.0 | +| [aws.ap-southeast-1](#provider\_aws.ap-southeast-1) | 3.72.0 | +| [aws.ap-southeast-2](#provider\_aws.ap-southeast-2) | 3.72.0 | +| [aws.ca-central-1](#provider\_aws.ca-central-1) | 3.72.0 | +| [aws.eu-central-1](#provider\_aws.eu-central-1) | 3.72.0 | +| [aws.eu-west-1](#provider\_aws.eu-west-1) | 3.72.0 | +| [aws.eu-west-3](#provider\_aws.eu-west-3) | 3.72.0 | +| [aws.sa-east-1](#provider\_aws.sa-east-1) | 3.72.0 | +| [aws.us-east-1](#provider\_aws.us-east-1) | 3.72.0 | +| [aws.us-east-2](#provider\_aws.us-east-2) | 3.72.0 | +| [aws.us-west-1](#provider\_aws.us-west-1) | 3.72.0 | +| [aws.us-west-2](#provider\_aws.us-west-2) | 3.72.0 | + +## Modules + +No modules. + +## Resources + +| Name | Type | +|------|------| +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_ap_northeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_ap_northeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_ap_south_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_ap_southeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_ap_southeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_ca_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_eu_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_eu_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_eu_west_3](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_sa_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_us_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_us_east_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_us_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_rule.guard_duty_findings_to_slack_us_west_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_ap_northeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_ap_northeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_ap_south_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_ap_southeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_ap_southeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_ca_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_eu_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_eu_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_eu_west_3](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_sa_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_us_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_us_east_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_us_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_cloudwatch_event_target.guard_duty_findings_to_slack_us_west_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource | +| [aws_iam_role.lambda](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource | +| [aws_iam_role_policy.lambda](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy) | resource | +| [aws_lambda_function.notify_slack](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_ap_northeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_ap_northeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_ap_south_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_ap_southeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_ap_southeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_ca_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_eu_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_eu_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_eu_west_3](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_sa_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_us_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_us_east_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_us_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_function.notify_slack_us_west_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource | +| [aws_lambda_permission.sns_notify_slack](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_ap_northeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_ap_northeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_ap_south_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_ap_southeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_ap_southeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_ca_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_eu_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_eu_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_eu_west_3](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_sa_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_us_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_us_east_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_us_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_lambda_permission.sns_notify_slack_us_west_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_ap_northeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_ap_northeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_ap_south_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_ap_southeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_ap_southeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_ca_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_eu_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_eu_west_3](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_sa_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_us_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_us_east_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_us_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.guard_duty_findings_to_slack_us_west_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic.topic](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic) | resource | +| [aws_sns_topic_subscription.sns_notify_slack](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_ap_northeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_ap_northeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_ap_south_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_ap_southeast_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_ap_southeast_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_ca_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_eu_central_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_eu_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_eu_west_3](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_sa_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_us_east_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_us_east_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_us_west_1](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [aws_sns_topic_subscription.sns_notify_slack_us_west_2](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | +| [archive_file.notify_slack](https://registry.terraform.io/providers/hashicorp/archive/latest/docs/data-sources/file) | data source | +| [aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source | +| [aws_iam_policy_document.lambda](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source | +| [aws_iam_policy_document.lambda_basic](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source | +| [aws_sns_topic.topic](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/sns_topic) | data source | + ## Inputs | Name | Description | Type | Default | Required | -|------|-------------|:----:|:-----:|:-----:| -| create\_sns\_topic | Whether to create new SNS topic | string | `"true"` | no | -| create\_with\_kms\_key | Whether to create resources with KMS encryption | string | `"false"` | no | -| lambda\_function\_name | The name of the Lambda function to create | string | `"guardduty_notify_slack"` | no | -| slack\_channel | The name of the channel in Slack for notifications | string | n/a | yes | -| slack\_emoji | A custom emoji that will appear on Slack messages | string | `":aws:"` | no | -| slack\_username | The username that will appear on Slack messages | string | n/a | yes | -| slack\_webhook\_url | The URL of the Slack webhook | string | n/a | yes | -| sns\_topic\_name | The name of the SNS topic to create | string | n/a | yes | - - -## Usage - -```hcl -module "notify_slack" { - source = "git::https://github.com/UKHomeOffice/acp-tf-guardduty-notify-slack?ref=master" - - sns_topic_name = "slack-topic" - - slack_webhook_url = "https://hooks.slack.com/services/AAA/BBB/CCC" - slack_channel = "AWS" - slack_username = "GuardDuty" -} -``` +|------|-------------|------|---------|:--------:| +| [create](#input\_create) | Whether to create all resources | `bool` | `true` | no | +| [create\_sns\_topic](#input\_create\_sns\_topic) | Whether to create new SNS topic | `bool` | `true` | no | +| [create\_with\_kms\_key](#input\_create\_with\_kms\_key) | Whether to create resources with KMS encryption | `bool` | `false` | no | +| [kms\_key\_arn](#input\_kms\_key\_arn) | ARN of the KMS key used for decrypting slack webhook url | `string` | `""` | no | +| [lambda\_function\_name](#input\_lambda\_function\_name) | The name of the Lambda function to create | `string` | `"guardduty_notify_slack"` | no | +| [slack\_channel](#input\_slack\_channel) | The name of the channel in Slack for notifications | `any` | n/a | yes | +| [slack\_emoji](#input\_slack\_emoji) | A custom emoji that will appear on Slack messages | `string` | `":aws:"` | no | +| [slack\_username](#input\_slack\_username) | The username that will appear on Slack messages | `any` | n/a | yes | +| [slack\_webhook\_url](#input\_slack\_webhook\_url) | The URL of the Slack webhook | `any` | n/a | yes | +| [sns\_topic\_name](#input\_sns\_topic\_name) | The name of the SNS topic to create | `any` | n/a | yes | + +## Outputs + +No outputs. + \ No newline at end of file diff --git a/provider.tf b/__providers__._tf_ similarity index 81% rename from provider.tf rename to __providers__._tf_ index db72254..57aaa28 100644 --- a/provider.tf +++ b/__providers__._tf_ @@ -1,3 +1,9 @@ +# Do not delete this file without understanding the consequences +# +# It is required for successfully validating the module +# By acting as a root module specifying the providers to use +# See the Drone pipeline for how this file is used + provider "aws" { region = "eu-west-2" } diff --git a/main.tf b/main.tf index 6fa9392..2065950 100644 --- a/main.tf +++ b/main.tf @@ -1,9 +1,5 @@ -terraform { - required_version = ">= 0.13" -} - locals { - lambda_filename = "${path.module}/functions/notify_slack.py" + lambda_filename = "${path.module}/functions/notify_slack.py" lambda_archive_filename = "${path.module}/functions/notify_slack.zip" } diff --git a/versions.tf b/versions.tf new file mode 100644 index 0000000..aa214d8 --- /dev/null +++ b/versions.tf @@ -0,0 +1,31 @@ +terraform { + required_version = ">= 1.0" + required_providers { + aws = { + source = "hashicorp/aws" + version = "~> 3.70" + configuration_aliases = [ + aws.eu-west-2, + aws.eu-west-1, + aws.us-east-1, + aws.us-east-2, + aws.us-west-2, + aws.us-west-1, + aws.ap-southeast-1, + aws.ap-southeast-2, + aws.ap-northeast-1, + aws.ap-northeast-2, + aws.ap-south-1, + aws.eu-central-1, + aws.eu-west-3, + aws.sa-east-1, + aws.ca-central-1 + ] + } + archive = { + source = "hashicorp/archive" + version = "~> 2.2" + } + } +} +