diff --git a/docs/reference/modules/terraform-aws-ci/aws-helpers/aws-helpers.md b/docs/reference/modules/terraform-aws-ci/aws-helpers/aws-helpers.md
index 596741931..5c1e2a06b 100644
--- a/docs/reference/modules/terraform-aws-ci/aws-helpers/aws-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/aws-helpers/aws-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# AWS Helpers
-View Source
+View Source
Release Notes
@@ -44,11 +44,11 @@ dependencies:
diff --git a/docs/reference/modules/terraform-aws-ci/build-helpers/build-helpers.md b/docs/reference/modules/terraform-aws-ci/build-helpers/build-helpers.md
index 0b658733c..c8f605f31 100644
--- a/docs/reference/modules/terraform-aws-ci/build-helpers/build-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/build-helpers/build-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Build Helpers
-View Source
+View Source
Release Notes
@@ -72,7 +72,7 @@ job using the [Jenkins Parameterized Trigger
Plugin](https://wiki.jenkins-ci.org/display/JENKINS/Parameterized+Trigger+Plugin). The `deploy-app` CI job, in turn,
would be a [parameterized build](https://wiki.jenkins-ci.org/display/JENKINS/Parameterized+Build) that takes as input
a parameter called `ARTIFACT_ID` (the same parameter name that's in the `artifacts.properties` file) and use it, along
-with the scripts in the [terraform-helpers module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/terraform-helpers) to automatically deploy the new AMI:
+with the scripts in the [terraform-helpers module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/terraform-helpers) to automatically deploy the new AMI:
```bash
cd templates
@@ -186,11 +186,11 @@ Note that the following conditions must be true in order to use this feature:
diff --git a/docs/reference/modules/terraform-aws-ci/check-url/check-url.md b/docs/reference/modules/terraform-aws-ci/check-url/check-url.md
index a12b5f7e4..bffaa776d 100644
--- a/docs/reference/modules/terraform-aws-ci/check-url/check-url.md
+++ b/docs/reference/modules/terraform-aws-ci/check-url/check-url.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Check Url
-View Source
+View Source
Release Notes
@@ -80,11 +80,11 @@ Success! Got expected status code '200' and text '2.0.0' from URL http://www.my-
diff --git a/docs/reference/modules/terraform-aws-ci/circleci-helpers/circleci-helpers.md b/docs/reference/modules/terraform-aws-ci/circleci-helpers/circleci-helpers.md
index 8147cf38b..875e9f5bd 100644
--- a/docs/reference/modules/terraform-aws-ci/circleci-helpers/circleci-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/circleci-helpers/circleci-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# CircleCI Helpers
-View Source
+View Source
Release Notes
@@ -66,11 +66,11 @@ dependencies:
diff --git a/docs/reference/modules/terraform-aws-ci/ec2-backup/ec2-backup.md b/docs/reference/modules/terraform-aws-ci/ec2-backup/ec2-backup.md
index 6be17d6c2..aec01a0f8 100644
--- a/docs/reference/modules/terraform-aws-ci/ec2-backup/ec2-backup.md
+++ b/docs/reference/modules/terraform-aws-ci/ec2-backup/ec2-backup.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# EC2 Backup Lambda Function Module
-View Source
+View Source
Release Notes
@@ -51,8 +51,8 @@ DLM:
## Example code
-* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples/jenkins) for working sample code.
-* See [vars.tf](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ec2-backup/vars.tf) for all parameters you can configure on this module.
+* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples/jenkins) for working sample code.
+* See [vars.tf](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ec2-backup/vars.tf) for all parameters you can configure on this module.
## Specifying an instance
@@ -103,7 +103,7 @@ automatically delete older snapshots. You can specify two parameters to control
module "ec_2_backup" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ec2-backup?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ec2-backup?ref=v0.60.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -173,7 +173,7 @@ module "ec_2_backup" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ec2-backup?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ec2-backup?ref=v0.60.0"
}
inputs = {
@@ -345,11 +345,11 @@ When true, all IAM policies will be managed as dedicated policies rather than in
diff --git a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-invoke-iam-policy/ecs-deploy-runner-invoke-iam-policy.md b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-invoke-iam-policy/ecs-deploy-runner-invoke-iam-policy.md
index b25b52c28..fb0324975 100644
--- a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-invoke-iam-policy/ecs-deploy-runner-invoke-iam-policy.md
+++ b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-invoke-iam-policy/ecs-deploy-runner-invoke-iam-policy.md
@@ -9,18 +9,18 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# ECS Deploy Runner Invoke IAM Policies module
-View Source
+View Source
Release Notes
This Terraform Module defines an [IAM
policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html) that
defines the minimal set of permissions necessary to trigger a deployment event for the deployment pipeline implemented
-in the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner).
+in the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner).
## Attaching IAM policy to IAM roles
@@ -58,7 +58,7 @@ resource "aws_iam_role_policy_attachment" "example" {
module "ecs_deploy_runner_invoke_iam_policy" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-invoke-iam-policy?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-invoke-iam-policy?ref=v0.60.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -97,7 +97,7 @@ module "ecs_deploy_runner_invoke_iam_policy" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-invoke-iam-policy?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-invoke-iam-policy?ref=v0.60.0"
}
inputs = {
@@ -210,11 +210,11 @@ The name of the IAM policy created with the permissions for invoking the ECS Dep
diff --git a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-standard-configuration/ecs-deploy-runner-standard-configuration.md b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-standard-configuration/ecs-deploy-runner-standard-configuration.md
index 28d38c7c2..ed0f07c0c 100644
--- a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-standard-configuration/ecs-deploy-runner-standard-configuration.md
+++ b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner-standard-configuration/ecs-deploy-runner-standard-configuration.md
@@ -9,16 +9,16 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# ECS Deploy Runner Standard Configuration module
-View Source
+View Source
Release Notes
This Terraform Module provides a streamlined interface to configure the [ecs-deploy-runner
-module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner) for a standard infrastructure and applications pipeline. This includes:
+module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner) for a standard infrastructure and applications pipeline. This includes:
* Base pipeline of build image, update variables, deploy infrastructure with Terraform/Terragrunt.
* Restricting git repos that can deploy infrastructure.
@@ -100,8 +100,8 @@ for more information).
## How do I invoke scripts in a given container?
-You can use the [infrastructure-deployer CLI](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deployer) to invoke a deployed ECS deploy runner. Refer
-to [How do I invoke the ECS deploy runner](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deployer/core-concepts.md#how-do-i-invoke-the-ecs-deploy-runner)
+You can use the [infrastructure-deployer CLI](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deployer) to invoke a deployed ECS deploy runner. Refer
+to [How do I invoke the ECS deploy runner](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deployer/core-concepts.md#how-do-i-invoke-the-ecs-deploy-runner)
for more information.
## Sample Usage
@@ -117,7 +117,7 @@ for more information.
module "ecs_deploy_runner_standard_configuration" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-standard-configuration?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-standard-configuration?ref=v0.60.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -223,7 +223,7 @@ module "ecs_deploy_runner_standard_configuration" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-standard-configuration?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner-standard-configuration?ref=v0.60.0"
}
inputs = {
@@ -953,11 +953,11 @@ Configuration map for the ecs-deploy-runner module that can be passed straight i
diff --git a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner/ecs-deploy-runner.md b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner/ecs-deploy-runner.md
index 5a3589dcc..c9641b1a6 100644
--- a/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner/ecs-deploy-runner.md
+++ b/docs/reference/modules/terraform-aws-ci/ecs-deploy-runner/ecs-deploy-runner.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Infrastructure Pipeline: ECS Deploy Runner
-View Source
+View Source
-Release Notes
+Release Notes
This module can be used to set up a secure CI/CD pipeline for your infrastructure code ([Terraform](https://www.terraform.io), [Terragrunt](https://terragrunt.gruntwork.io), [Packer](https://www.packer.io/), [Docker](https://www.docker.com/), etc). You can use this in combination with existing CI servers (e.g Jenkins, CircleCI, Gitlab) to set up workflows that:
@@ -29,7 +29,7 @@ This module can be used to set up a secure CI/CD pipeline for your infrastructur
These workflows can be implemented without directly running the steps from your CI servers. Instead, the CI server can coordinate the CI / CD flow, and for anything that requires sensitive / powerful IAM permissions, it can trigger pre-defined, locked-down jobs in an isolated ECS task, and stream the logs from that task as if it’s running locally.
-Refer to the [infrastructure-deployer CLI](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deployer) to integrate this with existing CI servers. You can also refer to the [infrastructure-deploy-script module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deploy-script) for more information on the underlying deployment scripts.
+Refer to the [infrastructure-deployer CLI](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deployer) to integrate this with existing CI servers. You can also refer to the [infrastructure-deploy-script module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deploy-script) for more information on the underlying deployment scripts.

@@ -53,17 +53,17 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr
### Core concepts
-* [Overview](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#overview): An overview of the architecture deployed by in this module, including how to implement a CI/CD pipeline for infrastructure code.
+* [Overview](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#overview): An overview of the architecture deployed by in this module, including how to implement a CI/CD pipeline for infrastructure code.
-* [Threat model of the deploy runner](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#threat-model-of-the-deploy-runner): An overview of the threat model used to design the security features of the solution, including a description of the potential attack vectors that are mitigated by the solution, and those attacks that require policy and behavioral changes to mitigate.
+* [Threat model of the deploy runner](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#threat-model-of-the-deploy-runner): An overview of the threat model used to design the security features of the solution, including a description of the potential attack vectors that are mitigated by the solution, and those attacks that require policy and behavioral changes to mitigate.
### Repo organization
-* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules.
+* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules.
-* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples): This folder contains working examples of how to use the submodules.
+* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples): This folder contains working examples of how to use the submodules.
-* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/test): Automated tests for the modules and examples.
+* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/test): Automated tests for the modules and examples.
## Deploy
@@ -71,29 +71,29 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr
If you just want to try this repo out for experimenting and learning, check out the following resources:
-* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage).
+* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage).
## Manage
-* [What configuration is recommended for container_images?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#what-configuration-is-recommended-for-container_images)
+* [What configuration is recommended for container_images?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#what-configuration-is-recommended-for-container_images)
-* [How do I restrict what args can be passed into the scripts?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#how-do-i-restrict-what-args-can-be-passed-into-the-scripts)
+* [How do I restrict what args can be passed into the scripts?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#how-do-i-restrict-what-args-can-be-passed-into-the-scripts)
-* [How do I trigger a deployment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#how-do-i-trigger-a-deployment)
+* [How do I trigger a deployment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#how-do-i-trigger-a-deployment)
-* [How do I trigger a deployment from CI?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#how-do-i-trigger-a-deployment-from-ci)
+* [How do I trigger a deployment from CI?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#how-do-i-trigger-a-deployment-from-ci)
-* [How do I customize the deployment task runtime environment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#what-container-is-used-for-the-deploy-task)
+* [How do I customize the deployment task runtime environment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#what-container-is-used-for-the-deploy-task)
-* [How do I use the deployment task container with a private VCS system such as GitHub Enterprise?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#how-do-i-use-the-ecs-deploy-runner-with-a-private-vcs-system-such-as-github-enterprise)
+* [How do I use the deployment task container with a private VCS system such as GitHub Enterprise?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#how-do-i-use-the-ecs-deploy-runner-with-a-private-vcs-system-such-as-github-enterprise)
-* [How do I stream logs from the deployment task?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#how-do-i-stream-logs-from-the-deployment-task)
+* [How do I stream logs from the deployment task?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#how-do-i-stream-logs-from-the-deployment-task)
-* [How do I access the stdout and stderr output from the underlying scripts?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#how-do-i-access-the-stdout-and-stderr-output-from-the-underlying-scripts)
+* [How do I access the stdout and stderr output from the underlying scripts?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#how-do-i-access-the-stdout-and-stderr-output-from-the-underlying-scripts)
-* [What are the IAM permissions necessary to trigger a deployment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner/core-concepts.md#what-are-the-iam-permissions-necessary-to-trigger-a-deployment)
+* [What are the IAM permissions necessary to trigger a deployment?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner/core-concepts.md#what-are-the-iam-permissions-necessary-to-trigger-a-deployment)
-* [How do I see the list of supported containers?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deployer/core-concepts.md#how-do-i-see-the-list-of-supported-containers)
+* [How do I see the list of supported containers?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deployer/core-concepts.md#how-do-i-see-the-list-of-supported-containers)
## Sample Usage
@@ -108,7 +108,7 @@ If you just want to try this repo out for experimenting and learning, check out
module "ecs_deploy_runner" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner?ref=v0.60.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -332,7 +332,7 @@ module "ecs_deploy_runner" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/ecs-deploy-runner?ref=v0.60.0"
}
inputs = {
@@ -1319,11 +1319,11 @@ Security Group ID of the ECS task
diff --git a/docs/reference/modules/terraform-aws-ci/git-helpers/git-helpers.md b/docs/reference/modules/terraform-aws-ci/git-helpers/git-helpers.md
index 9b578718f..5eeb4fee7 100644
--- a/docs/reference/modules/terraform-aws-ci/git-helpers/git-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/git-helpers/git-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Git Helpers
-View Source
+View Source
Release Notes
@@ -71,11 +71,11 @@ The main options to pass to `git-add-commit-push` are:
diff --git a/docs/reference/modules/terraform-aws-ci/github-release-helpers/github-release-helpers.md b/docs/reference/modules/terraform-aws-ci/github-release-helpers/github-release-helpers.md
index b72d3b0e4..e9ab434d1 100644
--- a/docs/reference/modules/terraform-aws-ci/github-release-helpers/github-release-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/github-release-helpers/github-release-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# GitHub Release Helpers
-View Source
+View Source
Release Notes
@@ -83,11 +83,11 @@ create-release --repo-owner gruntwork-io --repo-name terragrunt-engine-opentofu
diff --git a/docs/reference/modules/terraform-aws-ci/gruntwork-module-circleci-helpers/gruntwork-module-circleci-helpers.md b/docs/reference/modules/terraform-aws-ci/gruntwork-module-circleci-helpers/gruntwork-module-circleci-helpers.md
index 663c7404d..74dee2793 100644
--- a/docs/reference/modules/terraform-aws-ci/gruntwork-module-circleci-helpers/gruntwork-module-circleci-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/gruntwork-module-circleci-helpers/gruntwork-module-circleci-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Gruntwork Module CircleCI Helpers
-View Source
+View Source
Release Notes
@@ -191,11 +191,11 @@ variables](https://circleci.com/docs/environment-variables/).
diff --git a/docs/reference/modules/terraform-aws-ci/iam-policies/iam-policies.md b/docs/reference/modules/terraform-aws-ci/iam-policies/iam-policies.md
index c5907a82d..20d0ed899 100644
--- a/docs/reference/modules/terraform-aws-ci/iam-policies/iam-policies.md
+++ b/docs/reference/modules/terraform-aws-ci/iam-policies/iam-policies.md
@@ -9,21 +9,21 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# IAM Policies
-View Source
+View Source
Release Notes
This folder contains modules that create an IAM Policy with the minimum permissions needed to support specific CI use
cases. It includes:
-* [ecr-docker-push](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/iam-policies/ecr-docker-push): An IAM Policy that enables checking for an existing Docker image in Amazon ECR and pushing a new one.
-* [ecs-service-deployment](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/iam-policies/ecs-service-deployment): An IAM Policy that enables deploying a new Docker image to the ECS Cluster.
-* [terraform-remote-state-s3](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/iam-policies/terraform-remote-state-s3): An IAM Policy that enables using Terraform Remote State with S3.
-* [terragrunt](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/iam-policies/terragrunt): An IAM Policy that enables using the locking and user-identity features of Terragrunt.
+* [ecr-docker-push](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/iam-policies/ecr-docker-push): An IAM Policy that enables checking for an existing Docker image in Amazon ECR and pushing a new one.
+* [ecs-service-deployment](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/iam-policies/ecs-service-deployment): An IAM Policy that enables deploying a new Docker image to the ECS Cluster.
+* [terraform-remote-state-s3](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/iam-policies/terraform-remote-state-s3): An IAM Policy that enables using Terraform Remote State with S3.
+* [terragrunt](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/iam-policies/terragrunt): An IAM Policy that enables using the locking and user-identity features of Terragrunt.
## Background
@@ -66,11 +66,11 @@ Some modules are configurable to support whatever level of
diff --git a/docs/reference/modules/terraform-aws-ci/infrastructure-deploy-script/infrastructure-deploy-script.md b/docs/reference/modules/terraform-aws-ci/infrastructure-deploy-script/infrastructure-deploy-script.md
index ced944944..df6106173 100644
--- a/docs/reference/modules/terraform-aws-ci/infrastructure-deploy-script/infrastructure-deploy-script.md
+++ b/docs/reference/modules/terraform-aws-ci/infrastructure-deploy-script/infrastructure-deploy-script.md
@@ -9,15 +9,15 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Infrastructure Pipeline: Infrastructure Deploy Scripts
-View Source
+View Source
Release Notes
-This module contains a script for deploying arbitrary infrastructure code stored in version control using [Terraform](https://www.terraform.io) and [Terragrunt](https://terragrunt.gruntwork.io). The deployment script can be used to set up secure CI/CD pipelines for infrastructure code. The deployment script can run in any environment (e.g directly in CI servers, ECS task, EKS pod) to remotely run infrastructure code based on version control events. Refer to the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner) to run the deployment in an isolated ECS task, separate from the CI servers.
+This module contains a script for deploying arbitrary infrastructure code stored in version control using [Terraform](https://www.terraform.io) and [Terragrunt](https://terragrunt.gruntwork.io). The deployment script can be used to set up secure CI/CD pipelines for infrastructure code. The deployment script can run in any environment (e.g directly in CI servers, ECS task, EKS pod) to remotely run infrastructure code based on version control events. Refer to the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner) to run the deployment in an isolated ECS task, separate from the CI servers.
## Features
@@ -33,15 +33,15 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr
### Core concepts
-* [Overview of scripts](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deploy-script/core-concepts.md#overview): An overview of the scripts included in this module, including how to deploy and use the scripts to implement a CI/CD pipeline for IaC code.
+* [Overview of scripts](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deploy-script/core-concepts.md#overview): An overview of the scripts included in this module, including how to deploy and use the scripts to implement a CI/CD pipeline for IaC code.
### Repo organization
-* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules.
+* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules.
-* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples): This folder contains working examples of how to use the submodules.
+* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples): This folder contains working examples of how to use the submodules.
-* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/test): Automated tests for the modules and examples.
+* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/test): Automated tests for the modules and examples.
## Deploy
@@ -49,22 +49,22 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr
If you just want to try this repo out for experimenting and learning, check out the following resources:
-* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage).
+* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage).
## Manage
-* [Where do I run the deploy script?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deploy-script/core-concepts.md#where-do-i-run-the-deploy-script)
+* [Where do I run the deploy script?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deploy-script/core-concepts.md#where-do-i-run-the-deploy-script)
-* [What are the system requirements for the deploy script?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deploy-script/core-concepts.md#system-requirements)
+* [What are the system requirements for the deploy script?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deploy-script/core-concepts.md#system-requirements)
diff --git a/docs/reference/modules/terraform-aws-ci/infrastructure-deployer/infrastructure-deployer.md b/docs/reference/modules/terraform-aws-ci/infrastructure-deployer/infrastructure-deployer.md
index c0d3ad72a..bc3592a19 100644
--- a/docs/reference/modules/terraform-aws-ci/infrastructure-deployer/infrastructure-deployer.md
+++ b/docs/reference/modules/terraform-aws-ci/infrastructure-deployer/infrastructure-deployer.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Infrastructure Pipeline: Infrastructure Deployer CLI
-View Source
+View Source
-Release Notes
+Release Notes
This module contains a CLI that can be used to set up a secure CI/CD pipeline for your infrastructure code ([Terraform](https://www.terraform.io), [Terragrunt](https://terragrunt.gruntwork.io), [Packer](https://www.packer.io/), [Docker](https://www.docker.com/), etc). This CLI can be used to in existing CI servers (e.g Jenkins, CircleCI, GitLab) to set up workflows that:
@@ -27,9 +27,9 @@ This module contains a CLI that can be used to set up a secure CI/CD pipeline fo
* Automatically update infrastructure configurations and deploying them
-These workflows can be invoked on an isolated ECS task setup by the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner).
+These workflows can be invoked on an isolated ECS task setup by the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner).
-Refer to the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ecs-deploy-runner) for more information on the ECS task.
+Refer to the [ecs-deploy-runner module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ecs-deploy-runner) for more information on the ECS task.
## Features
@@ -51,15 +51,15 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr
### Core concepts
-* [Overview](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deployer/core-concepts.md#overview): An overview of the CLI and how to use it within CI jobs to implement an automated workflow for infrastructure code.
+* [Overview](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deployer/core-concepts.md#overview): An overview of the CLI and how to use it within CI jobs to implement an automated workflow for infrastructure code.
### Repo organization
-* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules.
+* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules.
-* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples): This folder contains working examples of how to use the submodules.
+* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples): This folder contains working examples of how to use the submodules.
-* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/test): Automated tests for the modules and examples.
+* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/test): Automated tests for the modules and examples.
## Deploy
@@ -67,24 +67,24 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr
If you just want to try this repo out for experimenting and learning, check out the following resources:
-* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage).
+* [examples folder](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples): The `examples` folder contains sample code optimized for learning, experimenting, and testing (but not production usage).
## Manage
-* [How do I install the infrastructure-deployer CLI?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deployer/core-concepts.md#how-do-i-install-the-infrastructure-deployer-cli)
+* [How do I install the infrastructure-deployer CLI?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deployer/core-concepts.md#how-do-i-install-the-infrastructure-deployer-cli)
-* [What are the IAM permissions](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deployer/core-concepts.md#what-are-the-iam-permissions-necessary-to-trigger-a-deployment)
+* [What are the IAM permissions](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deployer/core-concepts.md#what-are-the-iam-permissions-necessary-to-trigger-a-deployment)
-* [How do I invoke the ECS deploy runner?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/infrastructure-deployer/core-concepts.md#how-do-i-invoke-the-ecs-deploy-runner)
+* [How do I invoke the ECS deploy runner?](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/infrastructure-deployer/core-concepts.md#how-do-i-invoke-the-ecs-deploy-runner)
diff --git a/docs/reference/modules/terraform-aws-ci/install-jenkins/install-jenkins.md b/docs/reference/modules/terraform-aws-ci/install-jenkins/install-jenkins.md
index c74b689ff..12f57ec4c 100644
--- a/docs/reference/modules/terraform-aws-ci/install-jenkins/install-jenkins.md
+++ b/docs/reference/modules/terraform-aws-ci/install-jenkins/install-jenkins.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Install Jenkins Module
-View Source
+View Source
Release Notes
@@ -26,8 +26,8 @@ This module contains two scripts for working with [Jenkins CI server](https://je
## Example code
-* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples/jenkins) for working sample code.
-* See [install.sh](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/install-jenkins/install.sh) and [run-jenkins.sh](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/install-jenkins/run-jenkins) for all options you can pass to these scripts.
+* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples/jenkins) for working sample code.
+* See [install.sh](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/install-jenkins/install.sh) and [run-jenkins.sh](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/install-jenkins/run-jenkins) for all options you can pass to these scripts.
## Install Jenkins
@@ -45,13 +45,13 @@ gruntwork-install \
The command above will copy `install.sh` to your server, run it, install Jenkins 2.164.3, and copy the `run-jenkins`
script into `/usr/local/bin`. We recommend running this command in a [Packer template](https://www.packer.io/) so you
-can create an AMI with Jenkins installed. Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples/jenkins) for an example of such a
+can create an AMI with Jenkins installed. Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples/jenkins) for an example of such a
Packer template.
## Run Jenkins
Once you have an AMI with Jenkins installed, you need to deploy it on an EC2 Instance in AWS. The easiest way to do
-this is with the [jenkins-server module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/jenkins-server). When the EC2 Instance is booting, you should
+this is with the [jenkins-server module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/jenkins-server). When the EC2 Instance is booting, you should
typically do two things in [User Data](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/user-data.html):
1. Mount an EBS volume for the Jenkins home directory. You want to use an EBS volume so that your Jenkins data is
@@ -68,16 +68,16 @@ typically do two things in [User Data](https://docs.aws.amazon.com/AWSEC2/latest
--jenkins-home "/jenkins"
```
-Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples/jenkins) for an example of such a User Data script.
+Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples/jenkins) for an example of such a User Data script.
diff --git a/docs/reference/modules/terraform-aws-ci/jenkins-server/jenkins-server.md b/docs/reference/modules/terraform-aws-ci/jenkins-server/jenkins-server.md
index 4bc553ea3..4868ec5e7 100644
--- a/docs/reference/modules/terraform-aws-ci/jenkins-server/jenkins-server.md
+++ b/docs/reference/modules/terraform-aws-ci/jenkins-server/jenkins-server.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Jenkins server
-View Source
+View Source
Release Notes
@@ -29,17 +29,17 @@ to run an ASG for Jenkins that can correctly reattach an EBS volume.
## Example code
-* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples/jenkins) for working sample code.
-* See [vars.tf](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/jenkins-server/vars.tf) for all parameters you can configure on this module.
+* Check out the [jenkins example](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples/jenkins) for working sample code.
+* See [vars.tf](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/jenkins-server/vars.tf) for all parameters you can configure on this module.
## Jenkins AMI
-See the [install-jenkins module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/install-jenkins) for a way to create an AMI with Jenkins installed and a
+See the [install-jenkins module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/install-jenkins) for a way to create an AMI with Jenkins installed and a
script you can run in User Data to start Jenkins while the server is booting.
## Backing up Jenkins
-See the [ec2-backup module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/ec2-backup) for an automatic way to take scheduled backups of Jenkins and its EBS
+See the [ec2-backup module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/ec2-backup) for an automatic way to take scheduled backups of Jenkins and its EBS
volume.
## IAM permissions
@@ -112,7 +112,7 @@ data "aws_iam_policy_document" "example" {
module "jenkins_server" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/jenkins-server?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/jenkins-server?ref=v0.60.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -385,7 +385,7 @@ module "jenkins_server" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/jenkins-server?ref=v0.59.10"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-ci.git//modules/jenkins-server?ref=v0.60.0"
}
inputs = {
@@ -1252,11 +1252,11 @@ A maximum duration to wait for each server to be healthy before timing out (e.g.
diff --git a/docs/reference/modules/terraform-aws-ci/kubernetes-circleci-helpers/kubernetes-circleci-helpers.md b/docs/reference/modules/terraform-aws-ci/kubernetes-circleci-helpers/kubernetes-circleci-helpers.md
index ae55b0359..c18b5ec36 100644
--- a/docs/reference/modules/terraform-aws-ci/kubernetes-circleci-helpers/kubernetes-circleci-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/kubernetes-circleci-helpers/kubernetes-circleci-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Kubernetes CircleCI Helpers
-View Source
+View Source
Release Notes
@@ -98,11 +98,11 @@ job:
diff --git a/docs/reference/modules/terraform-aws-ci/monorepo-helpers/monorepo-helpers.md b/docs/reference/modules/terraform-aws-ci/monorepo-helpers/monorepo-helpers.md
index 02045ce50..a5ddfc908 100644
--- a/docs/reference/modules/terraform-aws-ci/monorepo-helpers/monorepo-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/monorepo-helpers/monorepo-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Infrastructure Pipeline: Monorepo Helpers
-View Source
+View Source
Release Notes
@@ -41,15 +41,15 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr
### Core concepts
-* [Overview of scripts](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/monorepo-helpers/core-concepts.md#overview): An overview of the scripts included in this module, including how they work.
+* [Overview of scripts](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/monorepo-helpers/core-concepts.md#overview): An overview of the scripts included in this module, including how they work.
### Repo organization
-* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules.
+* [modules](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules): the main implementation code for this repo, broken down into multiple standalone, orthogonal submodules.
-* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/examples): This folder contains working examples of how to use the submodules.
+* [examples](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/examples): This folder contains working examples of how to use the submodules.
-* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/test): Automated tests for the modules and examples.
+* [test](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/test): Automated tests for the modules and examples.
## Deploy
@@ -57,7 +57,7 @@ This repo is a part of [the Gruntwork Infrastructure as Code Library](https://gr
If you just want to try this module out for experimenting and learning, check out the following resources:
-* [CircleCI Quickstart](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/monorepo-helpers/core-concepts.md#circleci-quickstart): Quickstart guide for integrating the scripts into CircleCI to setup dynamic test selection.
+* [CircleCI Quickstart](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/monorepo-helpers/core-concepts.md#circleci-quickstart): Quickstart guide for integrating the scripts into CircleCI to setup dynamic test selection.
### Production deployment
@@ -65,22 +65,22 @@ If you just want to try this module out for experimenting and learning, check ou
## Manage
-* [How to configure direct test mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/monorepo-helpers/core-concepts.md#how-to-configure-direct-test-mappings)
+* [How to configure direct test mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/monorepo-helpers/core-concepts.md#how-to-configure-direct-test-mappings)
-* [How to override the files checked by validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/monorepo-helpers/core-concepts.md#how-to-override-the-files-checked-by-validate-monorepo-test-mappings)
+* [How to override the files checked by validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/monorepo-helpers/core-concepts.md#how-to-override-the-files-checked-by-validate-monorepo-test-mappings)
-* [Adding a new module to a repo with validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/monorepo-helpers/core-concepts.md#adding-a-new-module-to-a-repo-with-validate-monorepo-test-mappings)
+* [Adding a new module to a repo with validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/monorepo-helpers/core-concepts.md#adding-a-new-module-to-a-repo-with-validate-monorepo-test-mappings)
-* [Adding a new file that has no tests to a repo with validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/monorepo-helpers/core-concepts.md#adding-a-new-file-that-has-no-tests-to-a-repo-with-validate-monorepo-test-mappings)
+* [Adding a new file that has no tests to a repo with validate-monorepo-test-mappings](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/monorepo-helpers/core-concepts.md#adding-a-new-file-that-has-no-tests-to-a-repo-with-validate-monorepo-test-mappings)
diff --git a/docs/reference/modules/terraform-aws-ci/sign-binary-helpers/sign-binary-helpers.md b/docs/reference/modules/terraform-aws-ci/sign-binary-helpers/sign-binary-helpers.md
index 7c9383f16..a3bdeba77 100644
--- a/docs/reference/modules/terraform-aws-ci/sign-binary-helpers/sign-binary-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/sign-binary-helpers/sign-binary-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Binary signing Helpers
-View Source
+View Source
Release Notes
@@ -149,11 +149,11 @@ References:
diff --git a/docs/reference/modules/terraform-aws-ci/terraform-helpers/terraform-helpers.md b/docs/reference/modules/terraform-aws-ci/terraform-helpers/terraform-helpers.md
index c441006ca..85b7e76d0 100644
--- a/docs/reference/modules/terraform-aws-ci/terraform-helpers/terraform-helpers.md
+++ b/docs/reference/modules/terraform-aws-ci/terraform-helpers/terraform-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Terraform Helpers
-View Source
+View Source
Release Notes
@@ -38,7 +38,7 @@ You can install these scripts using the [Gruntwork Installer](https://github.com
gruntwork-install --module-name "terraform-helpers" --repo "https://github.com/gruntwork-io/terraform-aws-ci" --tag "0.0.1"
```
-Note that `terraform-update-variable` depends on the [git-helpers module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.59.10/modules/git-helpers) being installed!
+Note that `terraform-update-variable` depends on the [git-helpers module](https://github.com/gruntwork-io/terraform-aws-ci/tree/v0.60.0/modules/git-helpers) being installed!
See the examples in the next section for how to use them.
@@ -340,11 +340,11 @@ and `apply` actions so that Terraform/Terragrunt can run. If you wish to impleme