Skip to content

fix(KMS): Kms key for CloudWatch #363

fix(KMS): Kms key for CloudWatch

fix(KMS): Kms key for CloudWatch #363

Workflow file for this run

name: Terraform Test
on:
pull_request:
push:
branches: [main, master]
jobs:
terraform-validate:
permissions:
actions: write
contents: write
discussions: write
pull-requests: write
id-token: write
runs-on: ubuntu-latest
strategy:
matrix:
path:
- modules/api-gateway
- modules/alb-logs-to-s3-to-cloudwatch
- modules/api-gateway-account-settings
- modules/aws-alb-to-cloudwatch-lambda
- modules/aws-cloudfront-security-headers
- modules/aws-cloudwatch-prometheus-metrics
- modules/aws-load-balancer-controller
- modules/aws-multi-vpc-peering
- modules/aws-network
- modules/aws-rds-postgres
- modules/aws-vpc-peering
- modules/aws-vpn-vpnendpoint
- modules/budgets
- modules/cloudfront-ssl-hsts
- modules/cloudfront-to-s3-to-cloudwatch
- modules/cloudfront
- modules/cloudtrail-s3-to-cloudwatch
- modules/cloudtrail
- modules/cloudwatch-alarm-notify
- modules/cloudwatch-cross-account-share
- modules/cloudwatch-log-metric
- modules/cloudwatch-metrics
- modules/cloudwatch
- modules/cognito-identitiy-pool
- modules/cognito-identity-pool-final
- modules/cognito-identity
- modules/cognito-user-pool
- modules/complete-eks-cluster
- modules/ecr
- modules/eks-iam-user-constrain
- modules/eks
- modules/elastic-search
- modules/external-secret-store
- modules/external-secrets
- modules/fluent-bit-logs-s3-to-cloudwatch
- modules/fluent-bit-to-s3
- modules/fluent-bit
- modules/goldilocks
- modules/iam-account-password-policy
- modules/iam-group
- modules/ingress
- modules/metric-filter
- modules/metrics-filter-multiple
- modules/metrics-server
- modules/mongodb-atlas
- modules/mongodb
- modules/rabbitmq
- modules/rds
- modules/route53-alerts-notify
- modules/s3
- modules/secret
- modules/service-alerts
- modules/sns-cronjob
- modules/sqs
- modules/ssl-certificate
- modules/vpc-flow-logs-to-s3-to-cloudwatch
- modules/vpc
- modules/waf
steps:
- uses: dasmeta/reusable-actions-workflows/terraform-test@4.2.0
with:
aws-region: ${{ secrets.AWS_REGION}}
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
path: ${{ matrix.path }}