diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md new file mode 100644 index 0000000..da1af53 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/bug_report.md @@ -0,0 +1,44 @@ +--- +name: Bug report +about: Create a report to help us improve +title: '' +labels: Streamline eCR, Cloud Enablement, aws, bug +assignees: '' + +--- + +**Describe the bug** +A clear and concise description of what feature is not working. + +**Impact** +Please describe the impact this bug is causing to your program or organization. + +**To Reproduce** +Steps to reproduce the behavior: +1. Go to '...' +2. Click on '....' +3. Scroll down to '....' +4. See error + +**Expected behavior** +A clear and concise description of what you expected to happen. + +**Screenshots** +If applicable, add screenshots to help explain your problem. + +**Logs** +If applicable, please attach logs to help describe your problem. + +**Desktop (please complete the following information):** + - OS: [e.g. iOS] + - Browser [e.g. chrome, safari] + - Version [e.g. 22] + +**Smartphone (please complete the following information):** + - Device: [e.g. iPhone6] + - OS: [e.g. iOS8.1] + - Browser [e.g. stock browser, safari] + - Version [e.g. 22] + +**Additional context** +Add any other context about the problem here. diff --git a/.github/ISSUE_TEMPLATE/feature_request.md b/.github/ISSUE_TEMPLATE/feature_request.md new file mode 100644 index 0000000..c32a237 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/feature_request.md @@ -0,0 +1,20 @@ +--- +name: Feature request +about: Suggest an idea for this project +title: '' +labels: Streamline eCR, Cloud Enablement, aws, enhancement +assignees: '' + +--- + +**Is your feature request related to a problem? Please describe.** +A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] + +**Describe the solution you'd like** +A clear and concise description of what you want to happen. + +**Describe alternatives you've considered** +A clear and concise description of any alternative solutions or features you've considered. + +**Additional context** +Add any other context or screenshots about the feature request here. diff --git a/.github/ISSUE_TEMPLATE/maintenance.md b/.github/ISSUE_TEMPLATE/maintenance.md new file mode 100644 index 0000000..8779770 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/maintenance.md @@ -0,0 +1,18 @@ +--- +name: Maintenance +about: Questions and requests related to organizational support and maintenance +title: '' +labels: Streamline eCR, Cloud Enablement, aws +assignees: '' + +--- + +**What type of help do you need?** + +* [ ] Question +* [ ] New Repo +* [ ] Delete Repo +* [ ] User Membership (please make sure new members are familiar with the [CDC open practices](https://github.com/CDCgov/template/blob/master/open_practices.md#profile-setup) and set up their profile with name and org info to help people collaborate with them) +* [ ] Other + +**Please describe how you'd like us to help.** diff --git a/terraform/implementation/ecs/README.md b/terraform/implementation/ecs/README.md index bdb13b1..55ece90 100644 --- a/terraform/implementation/ecs/README.md +++ b/terraform/implementation/ecs/README.md @@ -16,7 +16,7 @@ | Name | Source | Version | |------|--------|---------| -| [ecs](#module\_ecs) | CDCgov/dibbs-ecr-viewer/aws | 0.2.1 | +| [ecs](#module\_ecs) | CDCgov/dibbs-ecr-viewer/aws | 0.3.0 | | [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | 5.16.0 | ## Resources @@ -30,9 +30,9 @@ | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| | [availability\_zones](#input\_availability\_zones) | The availability zones to use | `list(string)` |
[| no | -| [internal](#input\_internal) | Flag to determine if the several AWS resources are public (intended for external access, public internet) or private (only intended to be accessed within your AWS VPC or avaiable with other means, a transit gateway for example). | `bool` | `false` | no | +| [internal](#input\_internal) | Flag to determine if the several AWS resources are public (intended for external access, public internet) or private (only intended to be accessed within your AWS VPC or avaiable with other means, a transit gateway for example). | `bool` | `true` | no | | [owner](#input\_owner) | The owner of the infrastructure | `string` | `"skylight"` | no | -| [phdi\_version](#input\_phdi\_version) | PHDI container image version | `string` | `"v1.6.9"` | no | +| [phdi\_version](#input\_phdi\_version) | PHDI container image version | `string` | `"v1.7.6"` | no | | [private\_subnets](#input\_private\_subnets) | The private subnets | `list(string)` |
"us-east-1a",
"us-east-1b",
"us-east-1c"
]
[| no | | [project](#input\_project) | The project name | `string` | `"dibbs"` | no | | [public\_subnets](#input\_public\_subnets) | The public subnets | `list(string)` |
"176.24.1.0/24",
"176.24.3.0/24"
]
[| no | diff --git a/terraform/implementation/ecs/_variable.tf b/terraform/implementation/ecs/_variable.tf index 9225797..e7b1544 100644 --- a/terraform/implementation/ecs/_variable.tf +++ b/terraform/implementation/ecs/_variable.tf @@ -20,7 +20,7 @@ variable "owner" { variable "phdi_version" { description = "PHDI container image version" type = string - default = "v1.6.9" + default = "v1.7.6" } variable "private_subnets" { diff --git a/terraform/implementation/ecs/main.tf b/terraform/implementation/ecs/main.tf index 900799e..a51f0c6 100644 --- a/terraform/implementation/ecs/main.tf +++ b/terraform/implementation/ecs/main.tf @@ -22,7 +22,7 @@ module "vpc" { module "ecs" { source = "CDCgov/dibbs-ecr-viewer/aws" - version = "0.2.1" + version = "0.3.0" # source = "../../../../terraform-aws-dibbs-ecr-viewer" public_subnet_ids = flatten(module.vpc.public_subnets) @@ -48,6 +48,9 @@ module "ecs" { # If the intent is to disable authentication, set ecr_viewer_app_env to "test" (default is "prod") # ecr_viewer_app_env = "test" + # To disable autoscaling, set enable_autoscaling to false (default is true) + # enable_autoscaling = false + # If intent is to use a metadata database for polutating the ecr-viewer library, setup the database data object to connect to the database (supported databases are postgres and sqlserver) # Postgresql database example # postgres_database_data = { diff --git a/terraform/modules/oidc/_data.tf b/terraform/modules/oidc/_data.tf index 90f82e1..87bd1ca 100644 --- a/terraform/modules/oidc/_data.tf +++ b/terraform/modules/oidc/_data.tf @@ -54,6 +54,9 @@ data "aws_iam_policy_document" "wildcard" { "acm:DescribeCertificate", "acm:GetCertificate", "acm:ListTagsForCertificate", + "application-autoscaling:DescribeScalableTargets", + "application-autoscaling:DescribeScalingPolicies", + "application-autoscaling:ListTagsForResource", "ec2:DescribeAddresses", "ec2:DescribeVpcEndpoints", "ec2:DescribePrefixLists", @@ -141,6 +144,11 @@ data "aws_iam_policy_document" "scoped_one" { data "aws_iam_policy_document" "scoped_two" { statement { actions = [ + "application-autoscaling:DeleteScalingPolicy", + "application-autoscaling:DeregisterScalableTarget", + "application-autoscaling:PutScalingPolicy", + "application-autoscaling:RegisterScalableTarget", + "application-autoscaling:TagResource", "ec2:createVpcEndpoint", "ec2:CreateFlowLogs", "ec2:CreateNatGateway", @@ -153,6 +161,7 @@ data "aws_iam_policy_document" "scoped_two" { "iam:PassRole", ] resources = [ + "arn:aws:application-autoscaling:${var.region}:${data.aws_caller_identity.current.account_id}:scalable-target/*", "arn:aws:ec2:${var.region}:${data.aws_caller_identity.current.account_id}:vpc/${local.vpc_id}", "arn:aws:ec2:${var.region}:${data.aws_caller_identity.current.account_id}:vpc-flow-log/*", "arn:aws:ec2:${var.region}:${data.aws_caller_identity.current.account_id}:subnet/*", @@ -246,11 +255,13 @@ data "aws_iam_policy_document" "resource_tags_update_actions" { "ec2:RevokeSecurityGroupIngress", "ec2:AssociateRouteTable", "ec2:ModifyVpcAttribute", + "ec2:ModifyVpcEndpoint", "ec2:CreateTags", "elasticloadbalancing:AddTags", "elasticloadbalancing:ModifyLoadBalancerAttributes", "elasticloadbalancing:ModifyTargetGroupAttributes", "elasticloadbalancing:RemoveTags", + "elasticloadbalancing:ModifyRule", "ecs:RegisterTaskDefinition", "ecs:UpdateService", "ecs:TagResource", @@ -275,6 +286,7 @@ data "aws_iam_policy_document" "resource_tags_update_actions" { resources = [ "arn:aws:appmesh:${var.region}:${data.aws_caller_identity.current.account_id}:mesh/${local.project_owner_workspace}", "arn:aws:ec2:${var.region}:${data.aws_caller_identity.current.account_id}:vpc/${local.vpc_id}", + "arn:aws:ec2:${var.region}:${data.aws_caller_identity.current.account_id}:vpc-endpoint/*", "arn:aws:ec2:${var.region}:${data.aws_caller_identity.current.account_id}:security-group/*", "arn:aws:ec2:${var.region}:${data.aws_caller_identity.current.account_id}:subnet/*", "arn:aws:ec2:${var.region}:${data.aws_caller_identity.current.account_id}:route-table/*",
"176.24.2.0/24",
"176.24.4.0/24"
]