Skip to content

Commit

Permalink
fix(deps): Update terraform modules
Browse files Browse the repository at this point in the history
  • Loading branch information
renovate-bot committed Oct 3, 2024
1 parent 387996d commit a9ec80d
Show file tree
Hide file tree
Showing 13 changed files with 26 additions and 26 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ resource "random_string" "suffix" {
// encrypted table example
module "kek_wrapping_key" {
source = "terraform-google-modules/kms/google"
version = "2.2.1"
version = "2.3.0"

project_id = local.data_governance_project_id
labels = { environment = "dev" }
Expand Down
2 changes: 1 addition & 1 deletion examples/standalone/workloads.tf
Original file line number Diff line number Diff line change
Expand Up @@ -247,7 +247,7 @@ resource "google_bigquery_table" "credit_card" {
*/
module "kek_wrapping_key" {
source = "terraform-google-modules/kms/google"
version = "2.2.1"
version = "2.3.0"

project_id = module.harness_projects.data_governance_project_id
labels = { environment = "dev" }
Expand Down
2 changes: 1 addition & 1 deletion modules/data-governance/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ resource "random_id" "suffix" {

module "cmek" {
source = "terraform-google-modules/kms/google"
version = "2.2.1"
version = "2.3.0"

project_id = var.data_governance_project_id
labels = var.labels
Expand Down
4 changes: 2 additions & 2 deletions modules/data-ingestion-sa/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ locals {
//Dataflow controller service account
module "dataflow_controller_service_account" {
source = "terraform-google-modules/service-accounts/google"
version = "4.1.1"
version = "4.4.0"

project_id = var.data_ingestion_project_id
names = ["sa-dataflow-controller"]
Expand Down Expand Up @@ -97,7 +97,7 @@ resource "google_service_account" "pubsub_writer_service_account" {
// Cloud Function service account
module "cloudfunction_controller_service_account" {
source = "terraform-google-modules/service-accounts/google"
version = "4.2"
version = "4.4"

project_id = var.data_ingestion_project_id
names = ["sa-cloudfunction-controller"]
Expand Down
4 changes: 2 additions & 2 deletions modules/data-ingestion/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ resource "random_id" "suffix" {
//storage data ingestion bucket
module "data_ingestion_bucket" {
source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket"
version = "3.4.0"
version = "3.4.1"

project_id = var.data_ingestion_project_id
labels = var.labels
Expand All @@ -38,7 +38,7 @@ module "data_ingestion_bucket" {

module "dataflow_bucket" {
source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket"
version = "3.4.0"
version = "3.4.1"

project_id = var.data_ingestion_project_id
labels = var.labels
Expand Down
2 changes: 1 addition & 1 deletion modules/harness-artifact-registry/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ resource "random_id" "project_id_suffix" {

module "external_flex_template_project" {
source = "terraform-google-modules/project-factory/google"
version = "14.0"
version = "14.5"

name = local.project_name
random_project_id = "true"
Expand Down
6 changes: 3 additions & 3 deletions modules/harness-logging/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ data "google_storage_project_service_account" "gcs_account" {

module "cmek" {
source = "terraform-google-modules/kms/google"
version = "2.2.1"
version = "2.3.0"
count = var.create_bucket ? 1 : 0

project_id = var.kms_project_id
Expand All @@ -54,7 +54,7 @@ module "cmek" {

module "logging_bucket" {
source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket"
version = "3.4.0"
version = "3.4.1"

count = var.create_bucket ? 1 : 0

Expand All @@ -69,7 +69,7 @@ module "logging_bucket" {

module "log_export" {
source = "terraform-google-modules/log-export/google"
version = "7.4.2"
version = "7.8.2"

for_each = var.projects_ids

Expand Down
6 changes: 3 additions & 3 deletions modules/harness-projects/dns.tf
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ resource "google_dns_policy" "default_policy" {

module "restricted_googleapis" {
source = "terraform-google-modules/cloud-dns/google"
version = "4.1.0"
version = "4.2.1"
project_id = module.data_ingestion_project.project_id
type = "private"
name = "dz-e-shared-restricted-apis"
Expand Down Expand Up @@ -76,7 +76,7 @@ module "restricted_googleapis" {

module "restricted_gcr" {
source = "terraform-google-modules/cloud-dns/google"
version = "4.1.0"
version = "4.2.1"
project_id = module.data_ingestion_project.project_id
type = "private"
name = "dz-e-shared-restricted-gcr"
Expand Down Expand Up @@ -109,7 +109,7 @@ module "restricted_gcr" {

module "restricted_pkg_dev" {
source = "terraform-google-modules/cloud-dns/google"
version = "4.1.0"
version = "4.2.1"
project_id = module.data_ingestion_project.project_id
type = "private"
name = "dz-e-shared-restricted-pkg-dev"
Expand Down
6 changes: 3 additions & 3 deletions modules/harness-projects/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ resource "random_id" "project_id_suffix" {

module "data_ingestion_project" {
source = "terraform-google-modules/project-factory/google"
version = "14.0"
version = "14.5"

name = local.data_ingestion_project_name
random_project_id = "true"
Expand Down Expand Up @@ -65,7 +65,7 @@ module "data_ingestion_project" {

module "data_governance_project" {
source = "terraform-google-modules/project-factory/google"
version = "14.0"
version = "14.5"

name = local.data_governance_project_name
random_project_id = "true"
Expand Down Expand Up @@ -95,7 +95,7 @@ module "data_governance_project" {

module "data_project" {
source = "terraform-google-modules/project-factory/google"
version = "14.0"
version = "14.5"

name = local.data_project_name
random_project_id = "true"
Expand Down
8 changes: 4 additions & 4 deletions modules/organization-policies/compute.tf
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ locals {

module "boolean_compute_org_policies" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.0"
version = "5.4.0"
for_each = local.boolean_compute_org_policies

policy_for = "project"
Expand All @@ -39,7 +39,7 @@ module "boolean_compute_org_policies" {

module "protocol_forwarding_creation" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"

policy_for = "project"
project_id = var.project_id
Expand All @@ -51,7 +51,7 @@ module "protocol_forwarding_creation" {

module "restrict_shared_vpc_subnetworks_policy" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"
count = length(var.trusted_shared_vpc_subnetworks) > 0 ? 1 : 0

policy_for = "project"
Expand All @@ -64,7 +64,7 @@ module "restrict_shared_vpc_subnetworks_policy" {

module "vm_external_ip_access" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"

policy_for = "project"
project_id = var.project_id
Expand Down
6 changes: 3 additions & 3 deletions modules/organization-policies/gcp.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ locals {

module "location_restriction_policy" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"

policy_for = "project"
project_id = var.project_id
Expand All @@ -32,7 +32,7 @@ module "location_restriction_policy" {

module "org_domain_restricted_sharing" {
source = "terraform-google-modules/org-policy/google//modules/domain_restricted_sharing"
version = "5.2.2"
version = "5.4.0"
count = length(var.domains_to_allow) == 0 ? 0 : 1

policy_for = "project"
Expand All @@ -43,7 +43,7 @@ module "org_domain_restricted_sharing" {

module "restricted_non_cmek_services" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"
count = length(var.restricted_non_cmek_services) > 0 ? 1 : 0

policy_for = "project"
Expand Down
2 changes: 1 addition & 1 deletion modules/organization-policies/iam.tf
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ locals {

module "boolean_iam_org_policies" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"
for_each = local.boolean_iam_org_policies

policy_for = "project"
Expand Down
2 changes: 1 addition & 1 deletion modules/vpc-sc-config/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ resource "random_id" "suffix" {

module "access_level_policy" {
source = "terraform-google-modules/vpc-service-controls/google//modules/access_level"
version = "5.0"
version = "5.2"
policy = var.access_context_manager_policy_id
name = local.access_policy_name
description = "policy with all available options to configure"
Expand Down

0 comments on commit a9ec80d

Please sign in to comment.