Skip to content

Commit 8f26ce1

Browse files
committed
Add a link to Cloudmith registry
1 parent 828aed4 commit 8f26ce1

File tree

4 files changed

+39
-7
lines changed

4 files changed

+39
-7
lines changed

README.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,14 @@
11
# Elastio Stack
22

3-
This repository contains necessary code to deploy the resources of elastio scanning solution in your cloud account (currently only AWS is supported).
3+
This repository contains necessary IaC code to deploy the resources of elastio scanning solution in your cloud account.
4+
5+
## Configure the Elastio Terraform Modules Registry
6+
7+
Elastio terraform modules are published to the public Cloudsmith registry. In order to use them from that registry add this to your [`.terraformrc`](https://developer.hashicorp.com/terraform/cli/config/config-file), which should reside in your home directory (if you are on Linux):
8+
9+
10+
```hcl
11+
credentials "terraform.cloudsmith.io" {
12+
token = "elastio/public/"
13+
}
14+
```

asset-account/terraform/stack-set/README.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,5 +5,19 @@ See [this README](../..) for more details on what this stack does.
55
This is a Terraform module, that is a thin wrapper on top of an [`aws_cloudformation_stack_set`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudformation_stack_set) and [`aws_cloudformation_stack_instances`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudformation_stack_instances) resources used to deploy the Elastio Asset Account stack.
66

77
See the `examples` directory for some examples of how this module can be used:
8+
89
- `self-managed` - deploy the stack set using the [self-managed permission model](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-getting-started-create-self-managed.html)
910
- `service-managed` - deploy the stack set using the [service-managed permission model](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-associate-stackset-with-org.html)
11+
12+
## Installation
13+
14+
[Configure](../../../README.md#configuring-the-terraform-modules-registry) the Elastio terraform module registry, and add this to your project:
15+
16+
```tf
17+
module "elastio_asset_account" {
18+
source = "terraform.cloudsmith.io/public/elastio-asset-account-stack-set/aws"
19+
version = "0.33.0"
20+
21+
// Provide input parameters
22+
}
23+
```

asset-account/terraform/stack-set/examples/self-managed/admin.tf

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,10 @@
1-
module "elastio_asset_accounts" {
2-
# Use the link from the real terraform registry here. Relative path is used for testing purposes.
3-
source = "../../"
1+
module "elastio_asset_account" {
2+
source = "terraform.cloudsmith.io/public/elastio-asset-account-stack-set/aws"
3+
version = "0.33.0"
4+
5+
# For testing purposes
6+
# source = "../../"
7+
48
providers = {
59
aws = aws.admin
610
}

asset-account/terraform/stack-set/examples/service-managed/main.tf

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,9 @@
1-
module "elastio_asset_accounts" {
2-
# Use the link from the real terraform registry here. Relative path is used for testing purposes.
3-
source = "../../"
1+
module "elastio_asset_account" {
2+
source = "terraform.cloudsmith.io/public/elastio-asset-account-stack-set/aws"
3+
version = "0.33.0"
4+
5+
# For testing purposes
6+
# source = "../../"
47

58
template_url = var.template_url
69

0 commit comments

Comments
 (0)