You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+14-13
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ $ cd terraform-aws-atlantis
46
46
47
47
5. Run `terraform output atlantis_url` to get URL where Atlantis is publicly reachable. (Note: It may take a minute or two to get it reachable for the first time)
48
48
49
-
6. Github webhook is automatically created if `github_token`, `github_organization` and `github_repo_names` were specified. Read [Add GitHub Webhook](https://github.com/runatlantis/atlantis#add-github-webhook) in the official Atlantis documentation or check [example "GitHub repository webhook for Atlantis"](https://github.com/terraform-aws-modules/terraform-aws-atlantis/tree/master/examples/github-repository-webhook) to add more webhooks.
49
+
6. Github webhook is automatically created if `github_token`, `github_owner` and `github_repo_names` were specified. Read [Add GitHub Webhook](https://github.com/runatlantis/atlantis#add-github-webhook) in the official Atlantis documentation or check [example "GitHub repository webhook for Atlantis"](https://github.com/terraform-aws-modules/terraform-aws-atlantis/tree/master/examples/github-repository-webhook) to add more webhooks.
50
50
51
51
### Run Atlantis as a Terraform module
52
52
@@ -55,7 +55,7 @@ This way allows integration with your existing Terraform configurations.
| [aws_iam_policy_document.ecs_task_access_secrets](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
256
256
| [aws_iam_policy_document.ecs_task_access_secrets_with_kms](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
257
257
| [aws_iam_policy_document.ecs_tasks](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
258
+
| [aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition) | data source |
258
259
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source |
259
260
| [aws_route53_zone.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/route53_zone) | data source |
260
261
@@ -335,7 +336,7 @@ allow_github_webhooks = true
335
336
| <a name="input_mount_points"></a> [mount\_points](#input\_mount\_points) | Container mount points. This is a list of maps, where each map should contain a `containerPath` and `sourceVolume`. The `readOnly` key is optional. | `list(any)` | `[]` | no |
336
337
| <a name="input_name"></a> [name](#input\_name) | Name to use on all resources created (VPC, ALB, etc) | `string` | `"atlantis"` | no |
337
338
| <a name="input_permissions_boundary"></a> [permissions\_boundary](#input\_permissions\_boundary) | If provided, all IAM roles will be created with this permissions boundary attached. | `string` | `null` | no |
338
-
| <a name="input_policies_arn"></a> [policies\_arn](#input\_policies\_arn) | A list of the ARN of the policies you want to apply | `list(string)` | <pre>[<br> "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"<br>]</pre> | no |
339
+
| <a name="input_policies_arn"></a> [policies\_arn](#input\_policies\_arn) | A list of the ARN of the policies you want to apply | `list(string)` | `null` | no |
339
340
| <a name="input_private_subnet_ids"></a> [private\_subnet\_ids](#input\_private\_subnet\_ids) | A list of IDs of existing private subnets inside the VPC | `list(string)` | `[]` | no |
340
341
| <a name="input_private_subnets"></a> [private\_subnets](#input\_private\_subnets) | A list of private subnets inside the VPC | `list(string)` | `[]` | no |
341
342
| <a name="input_propagate_tags"></a> [propagate\_tags](#input\_propagate\_tags) | Specifies whether to propagate the tags from the task definition or the service to the tasks. The valid values are SERVICE and TASK\_DEFINITION | `string` | `null` | no |
Copy file name to clipboardExpand all lines: examples/github-complete/README.md
+5-8
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ GitHub's personal access token can be generated at https://github.com/settings/t
8
8
9
9
## Usage
10
10
11
-
To run this code you need to copy `terraform.tfvars.sample` into `terraform.tfvars` and update the values locally or specify them using environment variables (`TF_VAR_github_token=xxx`, `TF_VAR_github_organization=xxx`, etc.). Once ready, execute:
11
+
To run this code you need to copy `terraform.tfvars.sample` into `terraform.tfvars` and update the values locally or specify them using environment variables (`TF_VAR_github_token=xxx`, `TF_VAR_github_owner=xxx`, etc.). Once ready, execute:
12
12
13
13
```bash
14
14
$ terraform init
@@ -29,9 +29,9 @@ Go to https://eu-west-1.console.aws.amazon.com/ecs/home?region=eu-west-1#/settin
@@ -63,12 +63,9 @@ Go to https://eu-west-1.console.aws.amazon.com/ecs/home?region=eu-west-1#/settin
63
63
| <aname="input_alb_ingress_cidr_blocks"></a> [alb\_ingress\_cidr\_blocks](#input\_alb\_ingress\_cidr\_blocks)| List of IPv4 CIDR ranges to use on all ingress rules of the ALB - use your personal IP in the form of `x.x.x.x/32` for restricted testing |`list(string)`| n/a | yes |
64
64
| <aname="input_allowed_repo_names"></a> [allowed\_repo\_names](#input\_allowed\_repo\_names)| Repositories that Atlantis will listen for events from and a webhook will be installed |`list(string)`| n/a | yes |
65
65
| <aname="input_domain"></a> [domain](#input\_domain)| Route53 domain name to use for ACM certificate. Route53 zone for this domain should be created in advance |`string`| n/a | yes |
| <aname="input_github_user"></a> [github\_user](#input\_github\_user)| Github user for Atlantis to utilize when performing Github activities |`string`| n/a | yes |
69
-
| <aname="input_region"></a> [region](#input\_region)| AWS region where resources will be created |`string`|`"us-east-1"`| no |
70
-
| <aname="input_trusted_entities"></a> [trusted\_entities](#input\_trusted\_entities)| A list of users or roles, that can assume the task role |`list(string)`|`[]`| no |
71
-
| <aname="input_trusted_principals"></a> [trusted\_principals](#input\_trusted\_principals)| A list of principals, in addition to ecs-tasks.amazonaws.com, that can assume the task role |`list(string)`| n/a | yes |
Copy file name to clipboardExpand all lines: examples/github-repository-webhook/README.md
+6-6
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
# GitHub repository webhook for Atlantis
2
2
3
-
Configuration in this directory creates GitHub repository webhooks configured to Atlantis URL. This example uses value of webhook secret which got generated when Atlantis setup by referring to `terraform.tfstate`, so this example has to run after Atlantis.
3
+
Configuration in this directory creates GitHub repository webhooks configured to Atlantis URL. This example uses value of webhook secret which got generated when Atlantis setup by referring to `terraform.tfstate`, so this example has to run after Atlantis.
4
4
5
-
GitHub's personal access token can be generated at https://github.com/settings/tokens
5
+
GitHub's personal access token can be generated at https://github.com/settings/tokens
6
6
7
7
## Usage
8
8
9
-
To run this code you need to copy `terraform.tfvars.sample` into `terraform.tfvars` and put your GitHub token and Github organization there or specify them using environment variables (`TF_VAR_github_token` and `TF_VAR_github_organization`). Once ready, execute:
9
+
To run this code you need to copy `terraform.tfvars.sample` into `terraform.tfvars` and put your GitHub token and Github owner there or specify them using environment variables (`TF_VAR_github_token` and `TF_VAR_github_owner`). Once ready, execute:
10
10
11
11
```bash
12
12
$ terraform init
@@ -21,9 +21,9 @@ Note that this example may create resources which cost money. Run `terraform des
0 commit comments