Skip to content

Commit

Permalink
fix: ci build (#212)
Browse files Browse the repository at this point in the history
* init cicd fix

* bump version
  • Loading branch information
grolston authored Aug 1, 2022
1 parent 60d17b6 commit 56f2913
Show file tree
Hide file tree
Showing 4 changed files with 11 additions and 7 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/publish.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ env:
ECR_REGISTRY: ${{ secrets.ECR_REGISTRY }}
ECR_REPOSITORY: ${{ secrets.ECR_REPOSITORY }}
## publish version for docker image
VERSION: "1.0.0"
VERSION: "1.0.1"

jobs:
testRules:
Expand Down
13 changes: 8 additions & 5 deletions docker/Dockerfile
Original file line number Diff line number Diff line change
@@ -1,8 +1,11 @@

FROM rust:alpine

RUN apk add --no-cache cargo tree
RUN cargo install cfn-guard
ENV PATH "/root/.cargo/bin:${PATH}"
FROM ubuntu:22.10
RUN apt-get update && \
apt-get install -y \
curl && \
apt-get clean && \
rm -rf /var/lib/apt/lists/*
RUN curl --proto '=https' --tlsv1.2 -sSf https://raw.githubusercontent.com/aws-cloudformation/cloudformation-guard/main/install-guard.sh | sh
ENV PATH "${PATH}:~/.guard/bin"

COPY ./output/ /
1 change: 1 addition & 0 deletions mappings/build.py
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,7 @@ def main(directory):
output_file_name = "./docker/output/" + rule_set + ".guard"
outputfile = open(output_file_name, "a")
outputfile.write(re.sub('<<', custom_message, inputfile, flags=re.M))
outputfile.write("\n")
outputfile.close()
# Closing file
build_file_contents.close()
Expand Down
2 changes: 1 addition & 1 deletion rules/aws/amazon_s3/s3_bucket_policy_grantee_check.guard
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
## Config Rule Name : s3-bucket-policy-grantee-check
## Config Rule URL: https://docs.aws.amazon.com/config/latest/developerguide/s3-bucket-policy-grantee-check.html

# Rule Intent: Checks that the access granted by the Amazon S3 bucket is restricted by any of the AWS principals, federated users, service principals, IP addresses, or VPCs that you provide.
# Rule Intent: Checks that the access granted by the Amazon S3 bucket is restricted by any of the AWS principals, federated users, service principals, IP addresses, or VPCs that you provide.

0 comments on commit 56f2913

Please sign in to comment.