From 3b952360db8d51f7815fbb9a6389f87e7ca8252b Mon Sep 17 00:00:00 2001 From: Mend Renovate Date: Tue, 27 Jan 2026 07:00:44 +0000 Subject: [PATCH] Update terraform --- .../tfengine/generated/devops/cicd/main.tf | 4 +-- .../tfengine/generated/devops/devops/main.tf | 6 ++-- .../tfengine/generated/devops/groups/main.tf | 4 +-- .../generated/folder_foundation/audit/main.tf | 16 ++++----- .../generated/folder_foundation/cicd/main.tf | 4 +-- .../folder_foundation/devops/main.tf | 6 ++-- .../example-prod-networks/main.tf | 8 ++--- .../folder_foundation/folders/main.tf | 2 +- .../folder_foundation/groups/main.tf | 4 +-- .../gke_cluster/gke_cluster/cluster/main.tf | 6 ++-- .../gke_cluster/kubernetes/main.tf | 6 ++-- .../gke_cluster/gke_cluster/networks/main.tf | 6 ++-- .../generated/iam_members/iam_members/main.tf | 12 +++---- .../generated/multi_envs/audit/main.tf | 12 +++---- .../generated/multi_envs/cicd/main.tf | 4 +-- .../generated/multi_envs/dev/data/main.tf | 6 ++-- .../generated/multi_envs/devops/main.tf | 6 ++-- .../generated/multi_envs/folders/main.tf | 2 +- .../generated/multi_envs/groups/main.tf | 4 +-- .../generated/multi_envs/prod/data/main.tf | 6 ++-- .../generated/org_foundation/audit/main.tf | 12 +++---- .../generated/org_foundation/cicd/main.tf | 4 +-- .../generated/org_foundation/devops/main.tf | 6 ++-- .../example-prod-networks/main.tf | 8 ++--- .../generated/org_foundation/folders/main.tf | 2 +- .../generated/org_foundation/groups/main.tf | 4 +-- .../org_foundation/org_policies/main.tf | 30 ++++++++-------- .../org_policies/org_policies/main.tf | 36 +++++++++---------- .../resources_only/resources/main.tf | 10 +++--- .../team/additional_iam_members/main.tf | 12 +++---- examples/tfengine/generated/team/cicd/main.tf | 8 ++--- .../tfengine/generated/team/devops/main.tf | 10 +++--- .../tfengine/generated/team/groups/main.tf | 4 +-- .../generated/team/kubernetes/main.tf | 6 ++-- .../generated/team/project_apps/main.tf | 14 ++++---- .../generated/team/project_data/main.tf | 16 ++++----- .../generated/team/project_networks/main.tf | 16 ++++----- .../generated/team/project_secrets/main.tf | 8 ++--- templates/tfengine/components/audit/main.tf | 8 ++--- templates/tfengine/components/cicd/main.tf | 2 +- templates/tfengine/components/devops/main.tf | 4 +-- .../tfengine/components/iam_members/main.tf | 10 +++--- .../tfengine/components/org_policies/main.tf | 34 +++++++++--------- templates/tfengine/components/project/main.tf | 4 +-- .../resources/bastion_hosts/main.tf | 2 +- .../resources/bigquery_datasets/main.tf | 2 +- .../resources/cloud_sql_instances/main.tf | 2 +- .../compute_instance_templates/main.tf | 4 +-- .../resources/compute_networks/main.tf | 4 +-- .../resources/compute_routers/main.tf | 2 +- .../components/resources/dns_zones/main.tf | 2 +- .../components/resources/gke_clusters/main.tf | 2 +- .../resources/healthcare_datasets/main.tf | 2 +- .../resources/project_iam_members/main.tf | 2 +- .../resources/pubsub_topics/main.tf | 2 +- .../resources/storage_buckets/main.tf | 2 +- .../resources/workload_identity/main.tf | 2 +- 57 files changed, 211 insertions(+), 211 deletions(-) diff --git a/examples/tfengine/generated/devops/cicd/main.tf b/examples/tfengine/generated/devops/cicd/main.tf index 71c27afe7..38bf4e224 100644 --- a/examples/tfengine/generated/devops/cicd/main.tf +++ b/examples/tfengine/generated/devops/cicd/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -179,7 +179,7 @@ resource "google_project_iam_member" "cloudbuild_scheduler_sa_project_iam" { # Cloud Build - Storage Bucket to store Cloud Build logs. module "logs_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = var.logs_bucket project_id = var.project_id diff --git a/examples/tfengine/generated/devops/devops/main.tf b/examples/tfengine/generated/devops/devops/main.tf index f8c4d01bb..2ce72f1ae 100644 --- a/examples/tfengine/generated/devops/devops/main.tf +++ b/examples/tfengine/generated/devops/devops/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } } @@ -33,7 +33,7 @@ terraform { # Create the project, enable APIs, and create the deletion lien, if specified. module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-devops" org_id = "12345678" @@ -52,7 +52,7 @@ module "project" { # Terraform state bucket, hosted in the devops project. module "state_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 5.0.0" + version = "~> 12.3.0" name = "example-terraform-state" project_id = module.project.project_id diff --git a/examples/tfengine/generated/devops/groups/main.tf b/examples/tfengine/generated/devops/groups/main.tf index 0ba471341..76aa950aa 100644 --- a/examples/tfengine/generated/devops/groups/main.tf +++ b/examples/tfengine/generated/devops/groups/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -28,7 +28,7 @@ terraform { module "project" { source = "terraform-google-modules/project-factory/google//modules/project_services" - version = "~> 14.4.0" + version = "~> 18.2.0" project_id = "example-devops" activate_apis = [] diff --git a/examples/tfengine/generated/folder_foundation/audit/main.tf b/examples/tfengine/generated/folder_foundation/audit/main.tf index 9c66a1ce4..15e1401ec 100644 --- a/examples/tfengine/generated/folder_foundation/audit/main.tf +++ b/examples/tfengine/generated/folder_foundation/audit/main.tf @@ -15,9 +15,9 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.0, <= 6" - google-beta = "<= 6" - kubernetes = "~> 2.10" + google = "<= 7" + google-beta = "<= 7" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -30,7 +30,7 @@ terraform { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-audit" org_id = "" @@ -70,7 +70,7 @@ resource "google_folder_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.7.0" + version = "~> 11.1.0" log_sink_name = "example-bigquery-audit-logs-sink" destination_uri = module.bigquery_destination.destination_uri @@ -83,7 +83,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.7.0" + version = "~> 11.1.0" dataset_name = "1yr_folder_audit_logs" project_id = module.project.project_id @@ -94,7 +94,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.7.0" + version = "~> 11.1.0" log_sink_name = "example-storage-audit-logs-sink" destination_uri = module.storage_destination.destination_uri @@ -110,7 +110,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.7.0" + version = "~> 11.1.0" storage_bucket_name = "7yr-folder-audit-logs" project_id = module.project.project_id diff --git a/examples/tfengine/generated/folder_foundation/cicd/main.tf b/examples/tfengine/generated/folder_foundation/cicd/main.tf index ccb0cea6b..2a2ac1edb 100644 --- a/examples/tfengine/generated/folder_foundation/cicd/main.tf +++ b/examples/tfengine/generated/folder_foundation/cicd/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -184,7 +184,7 @@ resource "google_service_account" "cloudbuild_sa" { # Cloud Build - Storage Bucket to store Cloud Build logs. module "logs_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = var.logs_bucket project_id = var.project_id diff --git a/examples/tfengine/generated/folder_foundation/devops/main.tf b/examples/tfengine/generated/folder_foundation/devops/main.tf index c1b0ee9cf..8b8611b2a 100644 --- a/examples/tfengine/generated/folder_foundation/devops/main.tf +++ b/examples/tfengine/generated/folder_foundation/devops/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } } @@ -33,7 +33,7 @@ terraform { # Create the project, enable APIs, and create the deletion lien, if specified. module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-devops" org_id = "" @@ -53,7 +53,7 @@ module "project" { # Terraform state bucket, hosted in the devops project. module "state_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 5.0.0" + version = "~> 12.3.0" name = "example-terraform-state" project_id = module.project.project_id diff --git a/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf b/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf index 9e9ed960d..c5166fb02 100644 --- a/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf +++ b/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -30,7 +30,7 @@ terraform { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-prod-networks" org_id = "" @@ -51,7 +51,7 @@ module "project" { module "example_network" { source = "terraform-google-modules/network/google" - version = "~> 7.5.0" + version = "~> 13.1.0" network_name = "example-network" project_id = module.project.project_id @@ -69,7 +69,7 @@ module "example_network" { module "example_router" { source = "terraform-google-modules/cloud-router/google" - version = "~> 6.0.2" + version = "~> 8.3.0" name = "example-router" project = module.project.project_id diff --git a/examples/tfengine/generated/folder_foundation/folders/main.tf b/examples/tfengine/generated/folder_foundation/folders/main.tf index e645b6056..ed1389968 100644 --- a/examples/tfengine/generated/folder_foundation/folders/main.tf +++ b/examples/tfengine/generated/folder_foundation/folders/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" diff --git a/examples/tfengine/generated/folder_foundation/groups/main.tf b/examples/tfengine/generated/folder_foundation/groups/main.tf index d3642ef86..7b13a16eb 100644 --- a/examples/tfengine/generated/folder_foundation/groups/main.tf +++ b/examples/tfengine/generated/folder_foundation/groups/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -28,7 +28,7 @@ terraform { module "project" { source = "terraform-google-modules/project-factory/google//modules/project_services" - version = "~> 14.4.0" + version = "~> 18.2.0" project_id = "example-devops" activate_apis = [] diff --git a/examples/tfengine/generated/gke_cluster/gke_cluster/cluster/main.tf b/examples/tfengine/generated/gke_cluster/gke_cluster/cluster/main.tf index 13eac4186..f74317164 100644 --- a/examples/tfengine/generated/gke_cluster/gke_cluster/cluster/main.tf +++ b/examples/tfengine/generated/gke_cluster/gke_cluster/cluster/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -30,7 +30,7 @@ terraform { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-apps" org_id = "12345678" @@ -63,7 +63,7 @@ provider "kubernetes" { module "example_cluster" { source = "terraform-google-modules/kubernetes-engine/google//modules/safer-cluster-update-variant" - version = "~> 29.0.0" + version = "~> 43.0.0" providers = { kubernetes = kubernetes.example_cluster diff --git a/examples/tfengine/generated/gke_cluster/gke_cluster/kubernetes/main.tf b/examples/tfengine/generated/gke_cluster/gke_cluster/kubernetes/main.tf index 31187c1cf..c6430ce4b 100644 --- a/examples/tfengine/generated/gke_cluster/gke_cluster/kubernetes/main.tf +++ b/examples/tfengine/generated/gke_cluster/gke_cluster/kubernetes/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -44,7 +44,7 @@ provider "kubernetes" { module "project" { source = "terraform-google-modules/project-factory/google//modules/project_services" - version = "~> 14.4.0" + version = "~> 18.2.0" project_id = "example-apps" activate_apis = [] @@ -71,7 +71,7 @@ resource "kubernetes_namespace" "example_namespace" { module "workload_identity_example_namespace" { source = "terraform-google-modules/kubernetes-engine/google//modules/workload-identity" - version = "29.0.0" + version = "43.0.0" project_id = module.project.project_id name = "example-sa" diff --git a/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf b/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf index c429f3591..8fc893e5c 100644 --- a/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf +++ b/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -30,7 +30,7 @@ terraform { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-networks" org_id = "12345678" @@ -50,7 +50,7 @@ module "project" { module "network" { source = "terraform-google-modules/network/google" - version = "~> 7.5.0" + version = "~> 13.1.0" network_name = "network" project_id = module.project.project_id diff --git a/examples/tfengine/generated/iam_members/iam_members/main.tf b/examples/tfengine/generated/iam_members/iam_members/main.tf index 1ee17269b..9da91f660 100644 --- a/examples/tfengine/generated/iam_members/iam_members/main.tf +++ b/examples/tfengine/generated/iam_members/iam_members/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -27,7 +27,7 @@ terraform { module "storage_bucket_iam_members" { source = "terraform-google-modules/iam/google//modules/storage_buckets_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.storage_bucket_iam_members : @@ -39,7 +39,7 @@ module "storage_bucket_iam_members" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.project_iam_members : @@ -51,7 +51,7 @@ module "project_iam_members" { module "folder_iam_members" { source = "terraform-google-modules/iam/google//modules/folders_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.folder_iam_members : @@ -63,7 +63,7 @@ module "folder_iam_members" { module "organization_iam_members" { source = "terraform-google-modules/iam/google//modules/organizations_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.organization_iam_members : @@ -75,7 +75,7 @@ module "organization_iam_members" { module "service_account_iam_members" { source = "terraform-google-modules/iam/google//modules/service_accounts_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.service_account_iam_members : diff --git a/examples/tfengine/generated/multi_envs/audit/main.tf b/examples/tfengine/generated/multi_envs/audit/main.tf index dd25d2915..a5d5ecf8a 100644 --- a/examples/tfengine/generated/multi_envs/audit/main.tf +++ b/examples/tfengine/generated/multi_envs/audit/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -30,7 +30,7 @@ terraform { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-audit" org_id = "" @@ -70,7 +70,7 @@ resource "google_folder_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.7.0" + version = "~> 11.1.0" log_sink_name = "example-bigquery-audit-logs-sink" destination_uri = module.bigquery_destination.destination_uri @@ -83,7 +83,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.7.0" + version = "~> 11.1.0" dataset_name = "1yr_folder_audit_logs" project_id = module.project.project_id @@ -94,7 +94,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.7.0" + version = "~> 11.1.0" log_sink_name = "example-storage-audit-logs-sink" destination_uri = module.storage_destination.destination_uri @@ -110,7 +110,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.7.0" + version = "~> 11.1.0" storage_bucket_name = "7yr-folder-audit-logs" project_id = module.project.project_id diff --git a/examples/tfengine/generated/multi_envs/cicd/main.tf b/examples/tfengine/generated/multi_envs/cicd/main.tf index e26f3d9e3..b2caa92a0 100644 --- a/examples/tfengine/generated/multi_envs/cicd/main.tf +++ b/examples/tfengine/generated/multi_envs/cicd/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -193,7 +193,7 @@ resource "google_service_account" "cloudbuild_sa" { # Cloud Build - Storage Bucket to store Cloud Build logs. module "logs_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = var.logs_bucket project_id = var.project_id diff --git a/examples/tfengine/generated/multi_envs/dev/data/main.tf b/examples/tfengine/generated/multi_envs/dev/data/main.tf index 59054170c..80fdbb9f8 100644 --- a/examples/tfengine/generated/multi_envs/dev/data/main.tf +++ b/examples/tfengine/generated/multi_envs/dev/data/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -37,7 +37,7 @@ data "terraform_remote_state" "folders" { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-data-dev" org_id = "" @@ -57,7 +57,7 @@ module "project" { module "example_bucket_dev" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = "example-bucket-dev" project_id = module.project.project_id diff --git a/examples/tfengine/generated/multi_envs/devops/main.tf b/examples/tfengine/generated/multi_envs/devops/main.tf index f4bff9346..d0152d2bf 100644 --- a/examples/tfengine/generated/multi_envs/devops/main.tf +++ b/examples/tfengine/generated/multi_envs/devops/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } } @@ -39,7 +39,7 @@ provider "google-beta" { # Create the project, enable APIs, and create the deletion lien, if specified. module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-devops" org_id = "" @@ -59,7 +59,7 @@ module "project" { # Terraform state bucket, hosted in the devops project. module "state_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 5.0.0" + version = "~> 12.3.0" name = "example-terraform-state" project_id = module.project.project_id diff --git a/examples/tfengine/generated/multi_envs/folders/main.tf b/examples/tfengine/generated/multi_envs/folders/main.tf index 059601979..0e247a086 100644 --- a/examples/tfengine/generated/multi_envs/folders/main.tf +++ b/examples/tfengine/generated/multi_envs/folders/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" diff --git a/examples/tfengine/generated/multi_envs/groups/main.tf b/examples/tfengine/generated/multi_envs/groups/main.tf index 01b7853c9..43f30076a 100644 --- a/examples/tfengine/generated/multi_envs/groups/main.tf +++ b/examples/tfengine/generated/multi_envs/groups/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -28,7 +28,7 @@ terraform { module "project" { source = "terraform-google-modules/project-factory/google//modules/project_services" - version = "~> 14.4.0" + version = "~> 18.2.0" project_id = "example-devops" activate_apis = [] diff --git a/examples/tfengine/generated/multi_envs/prod/data/main.tf b/examples/tfengine/generated/multi_envs/prod/data/main.tf index bcf2c531e..de14df724 100644 --- a/examples/tfengine/generated/multi_envs/prod/data/main.tf +++ b/examples/tfengine/generated/multi_envs/prod/data/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -37,7 +37,7 @@ data "terraform_remote_state" "folders" { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-data-prod" org_id = "" @@ -58,7 +58,7 @@ module "project" { module "example_bucket_prod" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = "example-bucket-prod" project_id = module.project.project_id diff --git a/examples/tfengine/generated/org_foundation/audit/main.tf b/examples/tfengine/generated/org_foundation/audit/main.tf index dce3dcb9f..bbc30f32f 100644 --- a/examples/tfengine/generated/org_foundation/audit/main.tf +++ b/examples/tfengine/generated/org_foundation/audit/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -30,7 +30,7 @@ terraform { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-audit" org_id = "12345678" @@ -69,7 +69,7 @@ resource "google_organization_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.7.0" + version = "~> 11.1.0" log_sink_name = "bigquery-audit-logs-sink" destination_uri = module.bigquery_destination.destination_uri @@ -82,7 +82,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.7.0" + version = "~> 11.1.0" dataset_name = "1yr_org_audit_logs" project_id = module.project.project_id @@ -93,7 +93,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.7.0" + version = "~> 11.1.0" log_sink_name = "storage-audit-logs-sink" destination_uri = module.storage_destination.destination_uri @@ -109,7 +109,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.7.0" + version = "~> 11.1.0" storage_bucket_name = "7yr-org-audit-logs" project_id = module.project.project_id diff --git a/examples/tfengine/generated/org_foundation/cicd/main.tf b/examples/tfengine/generated/org_foundation/cicd/main.tf index 347621d93..bf2677b2d 100644 --- a/examples/tfengine/generated/org_foundation/cicd/main.tf +++ b/examples/tfengine/generated/org_foundation/cicd/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -165,7 +165,7 @@ resource "google_service_account" "cloudbuild_sa" { # Cloud Build - Storage Bucket to store Cloud Build logs. module "logs_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = var.logs_bucket project_id = var.project_id diff --git a/examples/tfengine/generated/org_foundation/devops/main.tf b/examples/tfengine/generated/org_foundation/devops/main.tf index f8c4d01bb..2ce72f1ae 100644 --- a/examples/tfengine/generated/org_foundation/devops/main.tf +++ b/examples/tfengine/generated/org_foundation/devops/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } } @@ -33,7 +33,7 @@ terraform { # Create the project, enable APIs, and create the deletion lien, if specified. module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-devops" org_id = "12345678" @@ -52,7 +52,7 @@ module "project" { # Terraform state bucket, hosted in the devops project. module "state_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 5.0.0" + version = "~> 12.3.0" name = "example-terraform-state" project_id = module.project.project_id diff --git a/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf b/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf index f8b547b38..41827f4c1 100644 --- a/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf +++ b/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -30,7 +30,7 @@ terraform { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-prod-networks" org_id = "12345678" @@ -50,7 +50,7 @@ module "project" { module "example_network" { source = "terraform-google-modules/network/google" - version = "~> 7.5.0" + version = "~> 13.1.0" network_name = "example-network" project_id = module.project.project_id @@ -68,7 +68,7 @@ module "example_network" { module "example_router" { source = "terraform-google-modules/cloud-router/google" - version = "~> 6.0.2" + version = "~> 8.3.0" name = "example-router" project = module.project.project_id diff --git a/examples/tfengine/generated/org_foundation/folders/main.tf b/examples/tfengine/generated/org_foundation/folders/main.tf index c0a510a3b..f2e33cd84 100644 --- a/examples/tfengine/generated/org_foundation/folders/main.tf +++ b/examples/tfengine/generated/org_foundation/folders/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" diff --git a/examples/tfengine/generated/org_foundation/groups/main.tf b/examples/tfengine/generated/org_foundation/groups/main.tf index d3642ef86..7b13a16eb 100644 --- a/examples/tfengine/generated/org_foundation/groups/main.tf +++ b/examples/tfengine/generated/org_foundation/groups/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -28,7 +28,7 @@ terraform { module "project" { source = "terraform-google-modules/project-factory/google//modules/project_services" - version = "~> 14.4.0" + version = "~> 18.2.0" project_id = "example-devops" activate_apis = [] diff --git a/examples/tfengine/generated/org_foundation/org_policies/main.tf b/examples/tfengine/generated/org_foundation/org_policies/main.tf index 0f61c6082..a3a67ee28 100644 --- a/examples/tfengine/generated/org_foundation/org_policies/main.tf +++ b/examples/tfengine/generated/org_foundation/org_policies/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -32,7 +32,7 @@ terraform { # App Engine module "orgpolicy_appengine_disable_code_download" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -45,7 +45,7 @@ module "orgpolicy_appengine_disable_code_download" { # Cloud SQL module "orgpolicy_sql_restrict_authorized_networks" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -57,7 +57,7 @@ module "orgpolicy_sql_restrict_authorized_networks" { module "orgpolicy_sql_restrict_public_ip" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -70,7 +70,7 @@ module "orgpolicy_sql_restrict_public_ip" { # Compute Engine module "orgpolicy_compute_disable_nested_virtualization" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -82,7 +82,7 @@ module "orgpolicy_compute_disable_nested_virtualization" { module "orgpolicy_compute_disable_serial_port_access" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -94,7 +94,7 @@ module "orgpolicy_compute_disable_serial_port_access" { module "orgpolicy_compute_skip_default_network_creation" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -106,7 +106,7 @@ module "orgpolicy_compute_skip_default_network_creation" { module "orgpolicy_compute_vm_external_ip_access" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -119,7 +119,7 @@ module "orgpolicy_compute_vm_external_ip_access" { module "orgpolicy_compute_restrict_xpn_project_lien_removal" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -132,7 +132,7 @@ module "orgpolicy_compute_restrict_xpn_project_lien_removal" { # Cloud Identity and Access Management module "orgpolicy_iam_allowed_policy_member_domains" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -146,7 +146,7 @@ module "orgpolicy_iam_allowed_policy_member_domains" { # https://medium.com/@jryancanty/stop-downloading-google-cloud-service-account-keys-1811d44a97d9 module "orgpolicy_disable_service_account_key_creation" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -158,7 +158,7 @@ module "orgpolicy_disable_service_account_key_creation" { module "orgpolicy_disable_service_account_key_upload" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -170,7 +170,7 @@ module "orgpolicy_disable_service_account_key_upload" { module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -183,7 +183,7 @@ module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { # Google Cloud Platform - Resource Locations module "orgpolicy_gcp_resource_locations" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -197,7 +197,7 @@ module "orgpolicy_gcp_resource_locations" { # Cloud Storage module "orgpolicy_storage_uniform_bucket_level_access" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" diff --git a/examples/tfengine/generated/org_policies/org_policies/main.tf b/examples/tfengine/generated/org_policies/org_policies/main.tf index 29dd07ba5..603aa123e 100644 --- a/examples/tfengine/generated/org_policies/org_policies/main.tf +++ b/examples/tfengine/generated/org_policies/org_policies/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -32,7 +32,7 @@ terraform { # App Engine module "orgpolicy_appengine_disable_code_download" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -45,7 +45,7 @@ module "orgpolicy_appengine_disable_code_download" { # Cloud SQL module "orgpolicy_sql_restrict_authorized_networks" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -57,7 +57,7 @@ module "orgpolicy_sql_restrict_authorized_networks" { module "orgpolicy_sql_restrict_public_ip" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -70,7 +70,7 @@ module "orgpolicy_sql_restrict_public_ip" { # Compute Engine module "orgpolicy_compute_disable_nested_virtualization" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -82,7 +82,7 @@ module "orgpolicy_compute_disable_nested_virtualization" { module "orgpolicy_compute_disable_serial_port_access" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -93,7 +93,7 @@ module "orgpolicy_compute_disable_serial_port_access" { } module "orgpolicy_compute_restrict_shared_vpc_host_projects" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -106,7 +106,7 @@ module "orgpolicy_compute_restrict_shared_vpc_host_projects" { module "orgpolicy_compute_skip_default_network_creation" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -117,7 +117,7 @@ module "orgpolicy_compute_skip_default_network_creation" { } module "orgpolicy_compute_trusted_image_projects" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -129,7 +129,7 @@ module "orgpolicy_compute_trusted_image_projects" { } module "orgpolicy_compute_vm_can_ip_forward" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -142,7 +142,7 @@ module "orgpolicy_compute_vm_can_ip_forward" { module "orgpolicy_compute_vm_external_ip_access" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -155,7 +155,7 @@ module "orgpolicy_compute_vm_external_ip_access" { module "orgpolicy_compute_restrict_xpn_project_lien_removal" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -168,7 +168,7 @@ module "orgpolicy_compute_restrict_xpn_project_lien_removal" { # Cloud Identity and Access Management module "orgpolicy_iam_allowed_policy_member_domains" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -182,7 +182,7 @@ module "orgpolicy_iam_allowed_policy_member_domains" { # https://medium.com/@jryancanty/stop-downloading-google-cloud-service-account-keys-1811d44a97d9 module "orgpolicy_disable_service_account_key_creation" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -194,7 +194,7 @@ module "orgpolicy_disable_service_account_key_creation" { module "orgpolicy_disable_service_account_key_upload" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -206,7 +206,7 @@ module "orgpolicy_disable_service_account_key_upload" { module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -219,7 +219,7 @@ module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { # Google Cloud Platform - Resource Locations module "orgpolicy_gcp_resource_locations" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" @@ -233,7 +233,7 @@ module "orgpolicy_gcp_resource_locations" { # Cloud Storage module "orgpolicy_storage_uniform_bucket_level_access" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "organization" organization_id = "12345678" diff --git a/examples/tfengine/generated/resources_only/resources/main.tf b/examples/tfengine/generated/resources_only/resources/main.tf index a485981e0..5334f22c6 100644 --- a/examples/tfengine/generated/resources_only/resources/main.tf +++ b/examples/tfengine/generated/resources_only/resources/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -28,7 +28,7 @@ terraform { module "project" { source = "terraform-google-modules/project-factory/google//modules/project_services" - version = "~> 14.4.0" + version = "~> 18.2.0" project_id = "example-prod-project" activate_apis = [] @@ -36,7 +36,7 @@ module "project" { module "one_billion_ms_example_dataset" { source = "terraform-google-modules/bigquery/google" - version = "~> 7.0.0" + version = "~> 10.2.0" dataset_id = "1billion_ms_example_dataset" project_id = module.project.project_id @@ -60,7 +60,7 @@ module "one_billion_ms_example_dataset" { module "example_healthcare_dataset" { source = "terraform-google-modules/healthcare/google" - version = "~> 2.4.0" + version = "~> 3.1.0" name = "example-healthcare-dataset" project = module.project.project_id @@ -123,7 +123,7 @@ resource "google_service_account" "example_sa" { module "example_prod_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = "example-prod-bucket" project_id = module.project.project_id diff --git a/examples/tfengine/generated/team/additional_iam_members/main.tf b/examples/tfengine/generated/team/additional_iam_members/main.tf index eff18816c..8c4e0aa13 100644 --- a/examples/tfengine/generated/team/additional_iam_members/main.tf +++ b/examples/tfengine/generated/team/additional_iam_members/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -27,7 +27,7 @@ terraform { module "storage_bucket_iam_members" { source = "terraform-google-modules/iam/google//modules/storage_buckets_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.storage_bucket_iam_members : @@ -39,7 +39,7 @@ module "storage_bucket_iam_members" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.project_iam_members : @@ -51,7 +51,7 @@ module "project_iam_members" { module "folder_iam_members" { source = "terraform-google-modules/iam/google//modules/folders_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.folder_iam_members : @@ -63,7 +63,7 @@ module "folder_iam_members" { module "organization_iam_members" { source = "terraform-google-modules/iam/google//modules/organizations_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.organization_iam_members : @@ -75,7 +75,7 @@ module "organization_iam_members" { module "service_account_iam_members" { source = "terraform-google-modules/iam/google//modules/service_accounts_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.service_account_iam_members : diff --git a/examples/tfengine/generated/team/cicd/main.tf b/examples/tfengine/generated/team/cicd/main.tf index 7d1ef8ff5..eef0cff3e 100644 --- a/examples/tfengine/generated/team/cicd/main.tf +++ b/examples/tfengine/generated/team/cicd/main.tf @@ -15,9 +15,9 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.87, < 6" - google-beta = "<=6" - kubernetes = "~> 2.10" + google = "< 8" + google-beta = "<= 7" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -173,7 +173,7 @@ resource "google_service_account" "cloudbuild_sa" { # Cloud Build - Storage Bucket to store Cloud Build logs. module "logs_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = var.logs_bucket project_id = var.project_id diff --git a/examples/tfengine/generated/team/devops/main.tf b/examples/tfengine/generated/team/devops/main.tf index 284f881ab..962fa5c07 100644 --- a/examples/tfengine/generated/team/devops/main.tf +++ b/examples/tfengine/generated/team/devops/main.tf @@ -15,9 +15,9 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.0, <= 6" - google-beta = "<= 6" - kubernetes = "~> 2.10" + google = "<= 7" + google-beta = "<= 7" + kubernetes = "~> 3.0" } } @@ -39,7 +39,7 @@ provider "google-beta" { # Create the project, enable APIs, and create the deletion lien, if specified. module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-prod-devops" org_id = "" @@ -68,7 +68,7 @@ module "project" { # Terraform state bucket, hosted in the devops project. module "state_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 5.0.0" + version = "~> 12.3.0" name = "example-terraform-state" project_id = module.project.project_id diff --git a/examples/tfengine/generated/team/groups/main.tf b/examples/tfengine/generated/team/groups/main.tf index b1e8955a7..8848d2a84 100644 --- a/examples/tfengine/generated/team/groups/main.tf +++ b/examples/tfengine/generated/team/groups/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -28,7 +28,7 @@ terraform { module "project" { source = "terraform-google-modules/project-factory/google//modules/project_services" - version = "~> 14.4.0" + version = "~> 18.2.0" project_id = "example-prod-devops" activate_apis = [] diff --git a/examples/tfengine/generated/team/kubernetes/main.tf b/examples/tfengine/generated/team/kubernetes/main.tf index 05d1d9219..43dcdc093 100644 --- a/examples/tfengine/generated/team/kubernetes/main.tf +++ b/examples/tfengine/generated/team/kubernetes/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -44,7 +44,7 @@ provider "kubernetes" { module "project" { source = "terraform-google-modules/project-factory/google//modules/project_services" - version = "~> 14.4.0" + version = "~> 18.2.0" project_id = "example-prod-apps" activate_apis = [] @@ -74,7 +74,7 @@ resource "kubernetes_namespace" "namespace" { module "workload_identity_namespace" { source = "terraform-google-modules/kubernetes-engine/google//modules/workload-identity" - version = "29.0.0" + version = "43.0.0" project_id = module.project.project_id name = "runner" diff --git a/examples/tfengine/generated/team/project_apps/main.tf b/examples/tfengine/generated/team/project_apps/main.tf index b9bbd9998..9bb23f80b 100644 --- a/examples/tfengine/generated/team/project_apps/main.tf +++ b/examples/tfengine/generated/team/project_apps/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -36,7 +36,7 @@ resource "google_compute_address" "static" { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-prod-apps" org_id = "" @@ -111,7 +111,7 @@ resource "google_binary_authorization_policy" "policy" { module "instance_template" { source = "terraform-google-modules/vm/google//modules/instance_template" - version = "~> 10.1.1" + version = "~> 14.3.0" name_prefix = "instance-template" project_id = module.project.project_id @@ -147,7 +147,7 @@ module "instance_template" { module "instance" { source = "terraform-google-modules/vm/google//modules/compute_instance" - version = "~> 10.1.1" + version = "~> 14.3.0" hostname = "instance" instance_template = module.instance_template.self_link @@ -166,7 +166,7 @@ module "instance" { module "domain" { source = "terraform-google-modules/cloud-dns/google" - version = "~> 5.1.1" + version = "~> 7.0.0" name = "domain" project_id = module.project.project_id @@ -194,7 +194,7 @@ provider "kubernetes" { module "gke_cluster" { source = "terraform-google-modules/kubernetes-engine/google//modules/safer-cluster-update-variant" - version = "~> 29.0.0" + version = "~> 43.0.0" providers = { kubernetes = kubernetes.gke_cluster @@ -232,7 +232,7 @@ module "gke_cluster" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" projects = [module.project.project_id] mode = "additive" diff --git a/examples/tfengine/generated/team/project_data/main.tf b/examples/tfengine/generated/team/project_data/main.tf index d7e8c185d..4c4640c6d 100644 --- a/examples/tfengine/generated/team/project_data/main.tf +++ b/examples/tfengine/generated/team/project_data/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -38,7 +38,7 @@ data "google_secret_manager_secret_version" "db_password" { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-prod-data" org_id = "" @@ -81,7 +81,7 @@ module "project" { module "one_billion_ms_dataset" { source = "terraform-google-modules/bigquery/google" - version = "~> 7.0.0" + version = "~> 10.2.0" dataset_id = "1billion_ms_dataset" project_id = module.project.project_id @@ -95,7 +95,7 @@ module "one_billion_ms_dataset" { module "sql_instance" { source = "GoogleCloudPlatform/sql-db/google//modules/safer_mysql" - version = "~> 9.0.0" + version = "~> 27.2.0" name = "sql-instance" project_id = module.project.project_id @@ -116,7 +116,7 @@ module "sql_instance" { module "healthcare_dataset" { source = "terraform-google-modules/healthcare/google" - version = "~> 2.4.0" + version = "~> 3.1.0" name = "healthcare-dataset" project = module.project.project_id @@ -220,7 +220,7 @@ module "healthcare_dataset" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" projects = [module.project.project_id] mode = "additive" @@ -234,7 +234,7 @@ module "project_iam_members" { module "topic" { source = "terraform-google-modules/pubsub/google" - version = "~> 6.0" + version = "~> 8.0" topic = "topic" project_id = module.project.project_id @@ -262,7 +262,7 @@ module "topic" { module "example_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = "example-bucket" project_id = module.project.project_id diff --git a/examples/tfengine/generated/team/project_networks/main.tf b/examples/tfengine/generated/team/project_networks/main.tf index c7fe21193..a2274f7fc 100644 --- a/examples/tfengine/generated/team/project_networks/main.tf +++ b/examples/tfengine/generated/team/project_networks/main.tf @@ -17,7 +17,7 @@ terraform { required_providers { google = ">= 3.0" google-beta = ">= 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -30,7 +30,7 @@ terraform { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-prod-networks" org_id = "" @@ -61,7 +61,7 @@ module "project" { module "bastion_vm" { source = "terraform-google-modules/bastion-host/google" - version = "~> 6.0.0" + version = "~> 9.0.0" name = "bastion-vm" project = module.project.project_id @@ -91,7 +91,7 @@ EOF module "network" { source = "terraform-google-modules/network/google" - version = "~> 7.5.0" + version = "~> 13.1.0" network_name = "network" project_id = module.project.project_id @@ -134,7 +134,7 @@ module "network" { } module "cloud_sql_private_service_access_network" { source = "GoogleCloudPlatform/sql-db/google//modules/private_service_access" - version = "~> 9.0.0" + version = "~> 27.2.0" project_id = module.project.project_id vpc_network = module.network.network_name @@ -145,7 +145,7 @@ module "cloud_sql_private_service_access_network" { module "router" { source = "terraform-google-modules/cloud-router/google" - version = "~> 6.0.2" + version = "~> 8.3.0" name = "router" project = module.project.project_id @@ -170,7 +170,7 @@ module "router" { module "google_apis" { source = "terraform-google-modules/cloud-dns/google" - version = "~> 5.1.1" + version = "~> 7.0.0" name = "google-apis" project_id = module.project.project_id @@ -203,7 +203,7 @@ module "google_apis" { module "gcr" { source = "terraform-google-modules/cloud-dns/google" - version = "~> 5.1.1" + version = "~> 7.0.0" name = "gcr" project_id = module.project.project_id diff --git a/examples/tfengine/generated/team/project_secrets/main.tf b/examples/tfengine/generated/team/project_secrets/main.tf index 3627a28c2..384f30ecc 100644 --- a/examples/tfengine/generated/team/project_secrets/main.tf +++ b/examples/tfengine/generated/team/project_secrets/main.tf @@ -15,10 +15,10 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.0, <= 6" - google-beta = "<= 6" + google = "<= 7" + google-beta = "<= 7" null = "~> 3.0" - kubernetes = "~> 2.10" + kubernetes = "~> 3.0" } backend "gcs" { bucket = "example-terraform-state" @@ -36,7 +36,7 @@ resource "random_password" "db" { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "example-prod-secrets" org_id = "" diff --git a/templates/tfengine/components/audit/main.tf b/templates/tfengine/components/audit/main.tf index f2e83bb7b..f67faf027 100644 --- a/templates/tfengine/components/audit/main.tf +++ b/templates/tfengine/components/audit/main.tf @@ -42,7 +42,7 @@ resource "google_{{.parent_type}}_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.7.0" + version = "~> 11.1.0" log_sink_name = "{{get .logs_bigquery_dataset "sink_name" "bigquery-audit-logs-sink"}}" destination_uri = "${module.bigquery_destination.destination_uri}" @@ -55,7 +55,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.7.0" + version = "~> 11.1.0" dataset_name = "{{.logs_bigquery_dataset.dataset_id}}" project_id = module.project.project_id @@ -66,7 +66,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.7.0" + version = "~> 11.1.0" log_sink_name = "{{get .logs_storage_bucket "sink_name" "storage-audit-logs-sink"}}" destination_uri = "${module.storage_destination.destination_uri}" @@ -82,7 +82,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.7.0" + version = "~> 11.1.0" storage_bucket_name = "{{.logs_storage_bucket.name}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/cicd/main.tf b/templates/tfengine/components/cicd/main.tf index 39b0acd20..062b67782 100644 --- a/templates/tfengine/components/cicd/main.tf +++ b/templates/tfengine/components/cicd/main.tf @@ -264,7 +264,7 @@ resource "google_service_account" "cloudbuild_sa" { # Cloud Build - Storage Bucket to store Cloud Build logs. module "logs_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = var.logs_bucket project_id = var.project_id diff --git a/templates/tfengine/components/devops/main.tf b/templates/tfengine/components/devops/main.tf index 0329a6475..f949ada22 100644 --- a/templates/tfengine/components/devops/main.tf +++ b/templates/tfengine/components/devops/main.tf @@ -33,7 +33,7 @@ provider "google-beta" { # Create the project, enable APIs, and create the deletion lien, if specified. module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "{{.project.project_id}}" {{- if eq .parent_type "organization"}} @@ -67,7 +67,7 @@ module "project" { # Terraform state bucket, hosted in the devops project. module "state_bucket" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 5.0.0" + version = "~> 12.3.0" name = "{{.state_bucket}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/iam_members/main.tf b/templates/tfengine/components/iam_members/main.tf index 07c8ffda3..082a96cd1 100644 --- a/templates/tfengine/components/iam_members/main.tf +++ b/templates/tfengine/components/iam_members/main.tf @@ -14,7 +14,7 @@ limitations under the License. */ -}} module "storage_bucket_iam_members" { source = "terraform-google-modules/iam/google//modules/storage_buckets_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.storage_bucket_iam_members : @@ -26,7 +26,7 @@ module "storage_bucket_iam_members" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.project_iam_members : @@ -38,7 +38,7 @@ module "project_iam_members" { module "folder_iam_members" { source = "terraform-google-modules/iam/google//modules/folders_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.folder_iam_members : @@ -50,7 +50,7 @@ module "folder_iam_members" { module "organization_iam_members" { source = "terraform-google-modules/iam/google//modules/organizations_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.organization_iam_members : @@ -62,7 +62,7 @@ module "organization_iam_members" { module "service_account_iam_members" { source = "terraform-google-modules/iam/google//modules/service_accounts_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" mode = "additive" for_each = { for idx, member in var.service_account_iam_members : diff --git a/templates/tfengine/components/org_policies/main.tf b/templates/tfengine/components/org_policies/main.tf index 1043543e5..ce259f431 100644 --- a/templates/tfengine/components/org_policies/main.tf +++ b/templates/tfengine/components/org_policies/main.tf @@ -21,7 +21,7 @@ limitations under the License. */ -}} # App Engine module "orgpolicy_appengine_disable_code_download" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -34,7 +34,7 @@ module "orgpolicy_appengine_disable_code_download" { # Cloud SQL module "orgpolicy_sql_restrict_authorized_networks" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -46,7 +46,7 @@ module "orgpolicy_sql_restrict_authorized_networks" { module "orgpolicy_sql_restrict_public_ip" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -59,7 +59,7 @@ module "orgpolicy_sql_restrict_public_ip" { # Compute Engine module "orgpolicy_compute_disable_nested_virtualization" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -71,7 +71,7 @@ module "orgpolicy_compute_disable_nested_virtualization" { module "orgpolicy_compute_disable_serial_port_access" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -84,7 +84,7 @@ module "orgpolicy_compute_disable_serial_port_access" { {{- if index . "allowed_shared_vpc_host_projects"}} module "orgpolicy_compute_restrict_shared_vpc_host_projects" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -98,7 +98,7 @@ module "orgpolicy_compute_restrict_shared_vpc_host_projects" { module "orgpolicy_compute_skip_default_network_creation" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -111,7 +111,7 @@ module "orgpolicy_compute_skip_default_network_creation" { {{- if index . "allowed_trusted_image_projects"}} module "orgpolicy_compute_trusted_image_projects" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -127,7 +127,7 @@ module "orgpolicy_compute_trusted_image_projects" { {{- if index . "allowed_ip_forwarding_vms"}} module "orgpolicy_compute_vm_can_ip_forward" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -141,7 +141,7 @@ module "orgpolicy_compute_vm_can_ip_forward" { module "orgpolicy_compute_vm_external_ip_access" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -154,7 +154,7 @@ module "orgpolicy_compute_vm_external_ip_access" { module "orgpolicy_compute_restrict_xpn_project_lien_removal" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -167,7 +167,7 @@ module "orgpolicy_compute_restrict_xpn_project_lien_removal" { # Cloud Identity and Access Management module "orgpolicy_iam_allowed_policy_member_domains" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -181,7 +181,7 @@ module "orgpolicy_iam_allowed_policy_member_domains" { # https://medium.com/@jryancanty/stop-downloading-google-cloud-service-account-keys-1811d44a97d9 module "orgpolicy_disable_service_account_key_creation" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -193,7 +193,7 @@ module "orgpolicy_disable_service_account_key_creation" { module "orgpolicy_disable_service_account_key_upload" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -205,7 +205,7 @@ module "orgpolicy_disable_service_account_key_upload" { module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -218,7 +218,7 @@ module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { # Google Cloud Platform - Resource Locations module "orgpolicy_gcp_resource_locations" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -232,7 +232,7 @@ module "orgpolicy_gcp_resource_locations" { # Cloud Storage module "orgpolicy_storage_uniform_bucket_level_access" { source = "terraform-google-modules/org-policy/google" - version = "<= 6" + version = "<= 7" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" diff --git a/templates/tfengine/components/project/main.tf b/templates/tfengine/components/project/main.tf index e9bf6b1df..deec49fab 100644 --- a/templates/tfengine/components/project/main.tf +++ b/templates/tfengine/components/project/main.tf @@ -12,7 +12,7 @@ limitations under the License. */ -}} {{- if get . "exists"}} module "project" { source = "terraform-google-modules/project-factory/google//modules/project_services" - version = "~> 14.4.0" + version = "~> 18.2.0" project_id = "{{.project_id}}" activate_apis = {{- if has . "apis"}} {{hcl .apis}} {{- else}} [] {{end}} @@ -23,7 +23,7 @@ module "project" { # Shared VPC: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations#centralize_network_control module "project" { source = "terraform-google-modules/project-factory/google" - version = "~> 14.4.0" + version = "~> 18.2.0" name = "{{.project_id}}" {{- if eq .parent_type "organization"}} diff --git a/templates/tfengine/components/resources/bastion_hosts/main.tf b/templates/tfengine/components/resources/bastion_hosts/main.tf index 189fffe7a..bd54a6e14 100644 --- a/templates/tfengine/components/resources/bastion_hosts/main.tf +++ b/templates/tfengine/components/resources/bastion_hosts/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range .bastion_hosts}} module "{{resourceName . "name"}}" { source = "terraform-google-modules/bastion-host/google" - version = "~> 6.0.0" + version = "~> 9.0.0" name = "{{.name}}" project = module.project.project_id diff --git a/templates/tfengine/components/resources/bigquery_datasets/main.tf b/templates/tfengine/components/resources/bigquery_datasets/main.tf index e9c84c51f..87bde1d91 100644 --- a/templates/tfengine/components/resources/bigquery_datasets/main.tf +++ b/templates/tfengine/components/resources/bigquery_datasets/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range get . "bigquery_datasets"}} module "{{resourceName . "dataset_id"}}" { source = "terraform-google-modules/bigquery/google" - version = "~> 7.0.0" + version = "~> 10.2.0" dataset_id = "{{.dataset_id}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/resources/cloud_sql_instances/main.tf b/templates/tfengine/components/resources/cloud_sql_instances/main.tf index 82516fe1b..1ff5ea059 100644 --- a/templates/tfengine/components/resources/cloud_sql_instances/main.tf +++ b/templates/tfengine/components/resources/cloud_sql_instances/main.tf @@ -21,7 +21,7 @@ limitations under the License. */ -}} {{if eq .type "mysql" -}} module "{{resourceName . "name"}}" { source = "GoogleCloudPlatform/sql-db/google//modules/safer_mysql" - version = "~> 9.0.0" + version = "~> 27.2.0" name = "{{.name}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/resources/compute_instance_templates/main.tf b/templates/tfengine/components/resources/compute_instance_templates/main.tf index e7cc9adcb..6f9a56d3b 100644 --- a/templates/tfengine/components/resources/compute_instance_templates/main.tf +++ b/templates/tfengine/components/resources/compute_instance_templates/main.tf @@ -23,7 +23,7 @@ limitations under the License. */ -}} {{$subnet := .subnet -}} module "{{$template_resource_name}}" { source = "terraform-google-modules/vm/google//modules/instance_template" - version = "~> 10.1.1" + version = "~> 14.3.0" name_prefix = "{{.name_prefix}}" project_id = module.project.project_id @@ -87,7 +87,7 @@ EOF {{range get . "instances" -}} module "{{resourceName . "name"}}" { source = "terraform-google-modules/vm/google//modules/compute_instance" - version = "~> 10.1.1" + version = "~> 14.3.0" hostname = "{{.name}}" instance_template = module.{{$template_resource_name}}.self_link diff --git a/templates/tfengine/components/resources/compute_networks/main.tf b/templates/tfengine/components/resources/compute_networks/main.tf index 51656b7dd..baca43bb2 100644 --- a/templates/tfengine/components/resources/compute_networks/main.tf +++ b/templates/tfengine/components/resources/compute_networks/main.tf @@ -18,7 +18,7 @@ limitations under the License. */ -}} module "{{$resource_name}}" { source = "terraform-google-modules/network/google" - version = "~> 7.5.0" + version = "~> 13.1.0" network_name = "{{.name}}" project_id = module.project.project_id @@ -60,7 +60,7 @@ module "{{$resource_name}}" { {{- if has . "cloud_sql_private_service_access"}} module "cloud_sql_private_service_access_{{$resource_name}}" { source = "GoogleCloudPlatform/sql-db/google//modules/private_service_access" - version = "~> 9.0.0" + version = "~> 27.2.0" project_id = module.project.project_id vpc_network = module.{{$resource_name}}.network_name diff --git a/templates/tfengine/components/resources/compute_routers/main.tf b/templates/tfengine/components/resources/compute_routers/main.tf index 4ff12104c..56a6bbee2 100644 --- a/templates/tfengine/components/resources/compute_routers/main.tf +++ b/templates/tfengine/components/resources/compute_routers/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range .compute_routers}} module "{{resourceName . "name"}}" { source = "terraform-google-modules/cloud-router/google" - version = "~> 6.0.2" + version = "~> 8.3.0" name = "{{.name}}" project = module.project.project_id diff --git a/templates/tfengine/components/resources/dns_zones/main.tf b/templates/tfengine/components/resources/dns_zones/main.tf index 0e5dbf65c..839b83455 100644 --- a/templates/tfengine/components/resources/dns_zones/main.tf +++ b/templates/tfengine/components/resources/dns_zones/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range get . "dns_zones"}} module "{{resourceName . "name"}}" { source = "terraform-google-modules/cloud-dns/google" - version = "~> 5.1.1" + version = "~> 7.0.0" name = "{{.name}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/resources/gke_clusters/main.tf b/templates/tfengine/components/resources/gke_clusters/main.tf index 34226f490..b7ac68a1d 100644 --- a/templates/tfengine/components/resources/gke_clusters/main.tf +++ b/templates/tfengine/components/resources/gke_clusters/main.tf @@ -24,7 +24,7 @@ provider "kubernetes" { module "{{resourceName . "name"}}" { source = "terraform-google-modules/kubernetes-engine/google//modules/safer-cluster-update-variant" - version = "~> 29.0.0" + version = "~> 43.0.0" providers = { kubernetes = kubernetes.{{resourceName . "name"}} diff --git a/templates/tfengine/components/resources/healthcare_datasets/main.tf b/templates/tfengine/components/resources/healthcare_datasets/main.tf index 1d4a5c4a2..69920df2d 100644 --- a/templates/tfengine/components/resources/healthcare_datasets/main.tf +++ b/templates/tfengine/components/resources/healthcare_datasets/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range get . "healthcare_datasets"}} module "{{resourceName . "name"}}" { source = "terraform-google-modules/healthcare/google" - version = "~> 2.4.0" + version = "~> 3.1.0" name = "{{.name}}" project = module.project.project_id diff --git a/templates/tfengine/components/resources/project_iam_members/main.tf b/templates/tfengine/components/resources/project_iam_members/main.tf index 66e234d5b..8e22365af 100644 --- a/templates/tfengine/components/resources/project_iam_members/main.tf +++ b/templates/tfengine/components/resources/project_iam_members/main.tf @@ -13,7 +13,7 @@ See the License for the specific language governing permissions and limitations under the License. */}} module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.7.1" + version = "~> 8.2.0" projects = [module.project.project_id] mode = "additive" diff --git a/templates/tfengine/components/resources/pubsub_topics/main.tf b/templates/tfengine/components/resources/pubsub_topics/main.tf index 9fbab6c9f..b4cccd113 100644 --- a/templates/tfengine/components/resources/pubsub_topics/main.tf +++ b/templates/tfengine/components/resources/pubsub_topics/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range .pubsub_topics}} module "{{resourceName . "name"}}" { source = "terraform-google-modules/pubsub/google" - version = "~> 6.0" + version = "~> 8.0" topic = "{{.name}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/resources/storage_buckets/main.tf b/templates/tfengine/components/resources/storage_buckets/main.tf index a52f3046b..728f48ef5 100644 --- a/templates/tfengine/components/resources/storage_buckets/main.tf +++ b/templates/tfengine/components/resources/storage_buckets/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range get . "storage_buckets"}} module "{{resourceName . "name"}}" { source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" - version = "~> 1.4" + version = "~> 12.0" name = "{{.name}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/resources/workload_identity/main.tf b/templates/tfengine/components/resources/workload_identity/main.tf index 13e15d883..c94e7860e 100644 --- a/templates/tfengine/components/resources/workload_identity/main.tf +++ b/templates/tfengine/components/resources/workload_identity/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range get . "workload_identity"}} module "workload_identity_{{resourceName . "namespace"}}" { source = "terraform-google-modules/kubernetes-engine/google//modules/workload-identity" - version = "29.0.0" + version = "43.0.0" project_id = "{{.project_id}}" name = "{{.google_service_account_id}}"