Skip to content

Commit

Permalink
chore: Add terraform-docs delimiters (#256)
Browse files Browse the repository at this point in the history
* chore(aws_gcp_vpn): Add terraform-docs delimiters

* chore(aws_itse-roles): Add terraform-docs delimiters

* chore(google_bigquery_log_sink): Add terraform-docs delimiters

* chore(google_cdn-external): Add terraform-docs delimiters

* chore(google_cdn_backend_bucket): Add terraform-docs delimiters

* chore(google_certificate_manager_certificate_map): Add terraform-docs delimiters

* chore(google_cloudsql_mysql): Add terraform-docs delimiters

* chore(google_cloudsql_postgres): Add terraform-docs delimiters

* chore(google_datastream): Add terraform-docs delimiters

* chore(google_deployment_accounts): Add terraform-docs delimiters

* chore(google_gar): Add terraform-docs delimiters

* chore(google_gke): Add terraform-docs delimiters

* chore(google_gke_namespace_logging): Add terraform-docs delimiters

* chore(google_gke_tenant): Add terraform-docs delimiters

* chore(google_memcache): Add terraform-docs delimiters

* chore(google_monitoring): Add terraform-docs delimiters

* chore(google_permissions): Add terraform-docs delimiters

* chore(google_project-dns): Add terraform-docs delimiters

* chore(google_project): Add terraform-docs delimiters

* chore(google_psc_to_elastic): Add terraform-docs delimiters

* chore(google_redis): Add terraform-docs delimiters

* chore(google_tenant_project_bootstrap): Add terraform-docs delimiters

* chore(google_tfstate): Add terraform-docs delimiters

* chore(mozilla_workgroup): Add terraform-docs delimiters

* chore(aws_gcp_vpn): Add .terraform-docs.yml

* chore(aws_itse-roles): Add .terraform-docs.yml

* chore(google_bigquery_log_sink): Add .terraform-docs.yml

* chore(google_cdn-external): Add .terraform-docs.yml

* chore(google_cdn_backend_bucket): Add .terraform-docs.yml

* chore(google_certificate_manager_certificate_map): Add .terraform-docs.yml

* chore(google_deployment_accounts): Add .terraform-docs.yml

* chore(google_gar): Add .terraform-docs.yml

* chore(google_gke_tenant): Add .terraform-docs.yml

* chore(google_monitoring): Add .terraform-docs.yml

* chore(google_permissions): Add .terraform-docs.yml

* chore(google_project-dns): Add .terraform-docs.yml

* chore(google_project): Add .terraform-docs.yml

* chore(google_psc_to_elastic): Add .terraform-docs.yml

* chore(google_tenant_project_bootstrap): Add .terraform-docs.yml

* chore(google_tfstate): Add .terraform-docs.yml

* chore(google_workload_identity): Add .terraform-docs.yml

* chore(docs): aws_gcp_vpn/README.md

* chore(docs): aws_itse-roles/README.md

* chore(docs): google_bigquery_log_sink/README.md

* chore(docs): google_cdn-external/README.md

* chore(docs): google_cdn_backend_bucket/README.md

* chore(docs): google_certificate_manager_certificate_map/README.md

* chore(docs): google_deployment_accounts/README.md

* chore(docs): google_gar/README.md

* chore(docs): google_gke_tenant/README.md

* chore(docs): google_monitoring/README.md

* chore(docs): google_permissions/README.md

* chore(docs): google_project-dns/README.md

* chore(docs): google_project/README.md

* chore(docs): google_psc_to_elastic/README.md

* chore(docs): google_tenant_project_bootstrap/README.md

* chore(docs): google_tfstate/README.md

* chore(docs): google_workload_identity/README.md

* chore(docs): google_cloudsql_mysql/README.md

* chore(docs): google_cloudsql_postgres/README.md

* chore(docs): google_datastream/README.md

* chore(docs): google_gke/README.md

* chore(docs): google_gke_namespace_logging/README.md

* chore(docs): google_memcache/README.md

* chore(docs): google_redis/README.md

* chore(docs): mozilla_workgroup/README.md

---------

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
  • Loading branch information
jbuck and github-actions[bot] authored Feb 5, 2025
1 parent 726b095 commit f5ef063
Show file tree
Hide file tree
Showing 51 changed files with 454 additions and 879 deletions.
6 changes: 6 additions & 0 deletions aws_gcp_vpn/.terraform-docs.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
content: |-
{{ .Header }}
{{ .Inputs }}
{{ .Outputs }}
20 changes: 20 additions & 0 deletions aws_gcp_vpn/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,3 +24,23 @@ You'll also need to turn on Route Propagation in the routing table for this VPC
## Exporting peer VPN network routes to AWS

If you'd like to connect to a service using VPC networking peering, such as CloudSQL, [follow the steps](https://cloud.google.com/sql/docs/mysql/configure-private-ip#vpn) to export custom routes and then create a custom route advertisement for that range.

<!-- BEGIN_TF_DOCS -->


## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_aws_private_asn"></a> [aws\_private\_asn](#input\_aws\_private\_asn) | ASN for AWS VPN gateway | `number` | n/a | yes |
| <a name="input_aws_vpc_id"></a> [aws\_vpc\_id](#input\_aws\_vpc\_id) | AWS VPC id | `string` | n/a | yes |
| <a name="input_aws_vpn_gateway_id"></a> [aws\_vpn\_gateway\_id](#input\_aws\_vpn\_gateway\_id) | AWS VPN Gateway ID | `string` | n/a | yes |
| <a name="input_gcp_advertised_ip_ranges"></a> [gcp\_advertised\_ip\_ranges](#input\_gcp\_advertised\_ip\_ranges) | value | `set(object({ description = string, range = string }))` | `[]` | no |
| <a name="input_gcp_network_name"></a> [gcp\_network\_name](#input\_gcp\_network\_name) | GCP VPN network name | `string` | `"default"` | no |
| <a name="input_gcp_private_asn"></a> [gcp\_private\_asn](#input\_gcp\_private\_asn) | ASN for GCP VPN gateway | `number` | n/a | yes |
| <a name="input_gcp_project_id"></a> [gcp\_project\_id](#input\_gcp\_project\_id) | GCP project id | `string` | n/a | yes |

## Outputs

No outputs.
<!-- END_TF_DOCS -->
6 changes: 6 additions & 0 deletions aws_itse-roles/.terraform-docs.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
content: |-
{{ .Header }}
{{ .Inputs }}
{{ .Outputs }}
36 changes: 3 additions & 33 deletions aws_itse-roles/README.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
<!-- BEGIN_TF_DOCS -->
# Terraform Module for Default AWS Delegated Roles
Module that creates roles on accounts to allow delegated access from another account.

Expand All @@ -9,44 +10,12 @@ Module will create 4 different roles:
- itsre-poweruser - Similar to admin but can't do any IAM tasks
- itsre-atlantis - Atlantis (Terraform automation platform) role

## Requirements

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.0 |

## Modules

No modules.

## Resources

| Name | Type |
|------|------|
| [aws_iam_role.admin_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role.atlantis_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role.poweruser_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role.readonly_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role_policy_attachment.admin_attach](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [aws_iam_role_policy_attachment.atlantis_attach](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [aws_iam_role_policy_attachment.poweruser_attach](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [aws_iam_role_policy_attachment.readonly_attach](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.atlantis_assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |

## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_atlantis_principal"></a> [atlantis\_principal](#input\_atlantis\_principal) | AWS account role ARN linked to Atlantis GCP Workload Identity (e.g. entrypoint to all AWS accounts by a given Atlantis). | `string` | n/a | yes |
| <a name="input_additional_principals"></a> [additional\_principals](#input\_additional\_principals) | List of additional principals' (user, role) ARNs allowed to assume the itse roles defined here. | `list(string)` | `[]` | no |
| <a name="input_atlantis_principal"></a> [atlantis\_principal](#input\_atlantis\_principal) | AWS account role ARN linked to Atlantis GCP Workload Identity (e.g. entrypoint to all AWS accounts by a given Atlantis). | `string` | n/a | yes |
| <a name="input_external_account_id"></a> [external\_account\_id](#input\_external\_account\_id) | The AWS Account ID whose root user or Terraform role can assume the itse roles. Defaults to mozilla-itsre account. | `string` | `"177680776199"` | no |
| <a name="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration) | Maximum session time (in seconds). Defaults to 12 hours (43,200 seconds). | `string` | `"43200"` | no |
| <a name="input_region"></a> [region](#input\_region) | Region for AWS Resources (defaults to us-west-2). | `string` | `"us-west-2"` | no |
Expand All @@ -59,3 +28,4 @@ No modules.
| <a name="output_atlantis_role_arn"></a> [atlantis\_role\_arn](#output\_atlantis\_role\_arn) | ARN for the IT-SE Delegated Access Admin Role |
| <a name="output_poweruser_role_arn"></a> [poweruser\_role\_arn](#output\_poweruser\_role\_arn) | ARN for the IT-SE Delegated Access Admin Role |
| <a name="output_readonly_role_arn"></a> [readonly\_role\_arn](#output\_readonly\_role\_arn) | ARN for the IT-SE Delegated Access Admin Role |
<!-- END_TF_DOCS -->
6 changes: 6 additions & 0 deletions google_bigquery_log_sink/.terraform-docs.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
content: |-
{{ .Header }}
{{ .Inputs }}
{{ .Outputs }}
25 changes: 2 additions & 23 deletions google_bigquery_log_sink/README.md
Original file line number Diff line number Diff line change
@@ -1,27 +1,5 @@
## Requirements
<!-- BEGIN_TF_DOCS -->

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 |
| <a name="requirement_google"></a> [google](#requirement\_google) | >= 4.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_google"></a> [google](#provider\_google) | >= 4.0 |

## Modules

No modules.

## Resources

| Name | Type |
|------|------|
| [google_bigquery_dataset.self](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/bigquery_dataset) | resource |
| [google_logging_project_sink.self](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/logging_project_sink) | resource |
| [google_project_iam_member.self](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/project_iam_member) | resource |

## Inputs

Expand All @@ -34,3 +12,4 @@ No modules.
## Outputs

No outputs.
<!-- END_TF_DOCS -->
6 changes: 6 additions & 0 deletions google_cdn-external/.terraform-docs.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
content: |-
{{ .Header }}
{{ .Inputs }}
{{ .Outputs }}
48 changes: 9 additions & 39 deletions google_cdn-external/README.md
Original file line number Diff line number Diff line change
@@ -1,64 +1,34 @@
<!-- BEGIN_TF_DOCS -->
# Google CDN Distribution for external endpoints

## Requirements

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13 |
| <a name="requirement_google"></a> [google](#requirement\_google) | >= 4.42 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_google"></a> [google](#provider\_google) | >= 4.42 |

## Modules

No modules.

## Resources

| Name | Type |
|------|------|
| [google_compute_backend_bucket.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_backend_bucket) | resource |
| [google_compute_backend_service.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_backend_service) | resource |
| [google_compute_global_forwarding_rule.http](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_forwarding_rule) | resource |
| [google_compute_global_forwarding_rule.https](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_forwarding_rule) | resource |
| [google_compute_global_network_endpoint.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_network_endpoint) | resource |
| [google_compute_global_network_endpoint_group.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_network_endpoint_group) | resource |
| [google_compute_target_http_proxy.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_target_http_proxy) | resource |
| [google_compute_target_https_proxy.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_target_https_proxy) | resource |
| [google_compute_url_map.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_url_map) | resource |
| [google_compute_url_map.https_redirect](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_url_map) | resource |

## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_addresses"></a> [addresses](#input\_addresses) | IP Addresses. | <pre>object({<br> ipv4 = string,<br> ipv6 = string,<br> })</pre> | n/a | yes |
| <a name="input_addresses"></a> [addresses](#input\_addresses) | IP Addresses. | <pre>object({<br/> ipv4 = string,<br/> ipv6 = string,<br/> })</pre> | n/a | yes |
| <a name="input_application"></a> [application](#input\_application) | Application name. | `string` | n/a | yes |
| <a name="input_certs"></a> [certs](#input\_certs) | List of certificates ids. If this list is empty, this will be HTTP only. | `list(string)` | n/a | yes |
| <a name="input_environment"></a> [environment](#input\_environment) | Environment name. | `string` | n/a | yes |
| <a name="input_origin_fqdn"></a> [origin\_fqdn](#input\_origin\_fqdn) | Origin's fqdn: e.g., 'mozilla.org'. | `string` | n/a | yes |
| <a name="input_primary_hostname"></a> [primary\_hostname](#input\_primary\_hostname) | Primary hostname of service. | `string` | n/a | yes |
| <a name="input_backend_timeout_sec"></a> [backend\_timeout\_sec](#input\_backend\_timeout\_sec) | Timeout for backend service. | `number` | `10` | no |
| <a name="input_backend_type"></a> [backend\_type](#input\_backend\_type) | Backend type to create. Must be set to one of [service, bucket, service\_and\_bucket]. When service\_and\_bucket, the default backend is the service | `string` | `"service"` | no |
| <a name="input_bucket_name"></a> [bucket\_name](#input\_bucket\_name) | Name of GCS bucket to use as CDN backend. Required if backend\_type is set to 'bucket' or 'service\_and\_bucket'. | `string` | `""` | no |
| <a name="input_cache_key_policy"></a> [cache\_key\_policy](#input\_cache\_key\_policy) | Cache key policy config to be passed to backend service. | `map(any)` | `{}` | no |
| <a name="input_cdn_policy"></a> [cdn\_policy](#input\_cdn\_policy) | CDN policy config to be passed to backend service. | `map(any)` | `{}` | no |
| <a name="input_certs"></a> [certs](#input\_certs) | List of certificates ids. If this list is empty, this will be HTTP only. | `list(string)` | n/a | yes |
| <a name="input_compression_mode"></a> [compression\_mode](#input\_compression\_mode) | Can be AUTOMATIC or DISABLED | `string` | `"DISABLED"` | no |
| <a name="input_custom_response_headers"></a> [custom\_response\_headers](#input\_custom\_response\_headers) | Headers that the HTTP/S load balancer should add to proxied responses. | `list(string)` | `null` | no |
| <a name="input_environment"></a> [environment](#input\_environment) | Environment name. | `string` | n/a | yes |
| <a name="input_https_redirect"></a> [https\_redirect](#input\_https\_redirect) | Redirect from http to https. | `bool` | `true` | no |
| <a name="input_log_sample_rate"></a> [log\_sample\_rate](#input\_log\_sample\_rate) | Sample rate for Cloud Logging. Must be in the interval [0, 1]. | `number` | `1` | no |
| <a name="input_name"></a> [name](#input\_name) | Optional name of distribution. | `string` | `""` | no |
| <a name="input_negative_caching_policy"></a> [negative\_caching\_policy](#input\_negative\_caching\_policy) | Negative caching policy config to be passed to backend service. | <pre>list(object({<br> code = string<br> ttl = string<br> }))</pre> | `[]` | no |
| <a name="input_negative_caching_policy"></a> [negative\_caching\_policy](#input\_negative\_caching\_policy) | Negative caching policy config to be passed to backend service. | <pre>list(object({<br/> code = string<br/> ttl = string<br/> }))</pre> | `[]` | no |
| <a name="input_origin_fqdn"></a> [origin\_fqdn](#input\_origin\_fqdn) | Origin's fqdn: e.g., 'mozilla.org'. | `string` | n/a | yes |
| <a name="input_origin_port"></a> [origin\_port](#input\_origin\_port) | Port to use for origin. | `number` | `443` | no |
| <a name="input_origin_protocol"></a> [origin\_protocol](#input\_origin\_protocol) | Protocol for the origin. | `string` | `"HTTPS"` | no |
| <a name="input_path_rewrites"></a> [path\_rewrites](#input\_path\_rewrites) | Dictionary of path matchers. | <pre>map(object({<br> hosts = list(string)<br> paths = list(string)<br> target = string<br> backend_bucket_paths = optional(list(string))<br> }))</pre> | `{}` | no |
| <a name="input_path_rewrites"></a> [path\_rewrites](#input\_path\_rewrites) | Dictionary of path matchers. | <pre>map(object({<br/> hosts = list(string)<br/> paths = list(string)<br/> target = string<br/> backend_bucket_paths = optional(list(string))<br/> }))</pre> | `{}` | no |
| <a name="input_primary_hostname"></a> [primary\_hostname](#input\_primary\_hostname) | Primary hostname of service. | `string` | n/a | yes |
| <a name="input_quic_override"></a> [quic\_override](#input\_quic\_override) | Specifies the QUIC override policy. Possible values `NONE`, `ENABLE`, `DISABLE` | `string` | `"DISABLE"` | no |
| <a name="input_security_policy"></a> [security\_policy](#input\_security\_policy) | Security policy as defined by google\_compute\_security\_policy | `string` | `null` | no |

## Outputs

No outputs.
<!-- END_TF_DOCS -->
6 changes: 6 additions & 0 deletions google_cdn_backend_bucket/.terraform-docs.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
content: |-
{{ .Header }}
{{ .Inputs }}
{{ .Outputs }}
33 changes: 3 additions & 30 deletions google_cdn_backend_bucket/README.md
Original file line number Diff line number Diff line change
@@ -1,44 +1,16 @@
<!-- BEGIN_TF_DOCS -->
# google\_cdn\_backend\_bucket

this module builds a GCP Load Balancer with a backend bucket

## Requirements

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.8.3 |
| <a name="requirement_google"></a> [google](#requirement\_google) | >= 5.32.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_google"></a> [google](#provider\_google) | >= 5.32.0 |

## Modules

No modules.

## Resources

| Name | Type |
|------|------|
| [google_compute_backend_bucket.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_backend_bucket) | resource |
| [google_compute_global_forwarding_rule.http](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_forwarding_rule) | resource |
| [google_compute_global_forwarding_rule.https](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_forwarding_rule) | resource |
| [google_compute_target_http_proxy.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_target_http_proxy) | resource |
| [google_compute_target_https_proxy.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_target_https_proxy) | resource |
| [google_compute_url_map.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_url_map) | resource |
| [google_compute_url_map.https_redirect](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_url_map) | resource |

## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_addresses"></a> [addresses](#input\_addresses) | loadbalancer ips | `map(string)` | n/a | yes |
| <a name="input_application"></a> [application](#input\_application) | n/a | `string` | n/a | yes |
| <a name="input_bucket_name"></a> [bucket\_name](#input\_bucket\_name) | name of bucket to use for the CDN | `string` | n/a | yes |
| <a name="input_cdn_policy"></a> [cdn\_policy](#input\_cdn\_policy) | cdn policy | <pre>object({<br> cache_mode = optional(string, "CACHE_ALL_STATIC")<br> client_ttl = optional(number, 3600)<br> default_ttl = optional(number, 3600)<br> max_ttl = optional(number, 86400)<br> negative_caching = optional(bool, true)<br> serve_while_stale = optional(number, 86400)<br> })</pre> | n/a | yes |
| <a name="input_cdn_policy"></a> [cdn\_policy](#input\_cdn\_policy) | cdn policy | <pre>object({<br/> cache_mode = optional(string, "CACHE_ALL_STATIC")<br/> client_ttl = optional(number, 3600)<br/> default_ttl = optional(number, 3600)<br/> max_ttl = optional(number, 86400)<br/> negative_caching = optional(bool, true)<br/> serve_while_stale = optional(number, 86400)<br/> })</pre> | n/a | yes |
| <a name="input_certificates"></a> [certificates](#input\_certificates) | list of certificate ids to use on the https target proxy | `list(string)` | n/a | yes |
| <a name="input_compression_mode"></a> [compression\_mode](#input\_compression\_mode) | n/a | `string` | `"DISABLED"` | no |
| <a name="input_environment"></a> [environment](#input\_environment) | n/a | `string` | n/a | yes |
Expand All @@ -48,3 +20,4 @@ No modules.
## Outputs

No outputs.
<!-- END_TF_DOCS -->
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
content: |-
{{ .Header }}
{{ .Inputs }}
{{ .Outputs }}
Loading

0 comments on commit f5ef063

Please sign in to comment.