Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): Update terraform modules #66

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ resource "random_string" "suffix" {
// encrypted table example
module "kek_wrapping_key" {
source = "terraform-google-modules/kms/google"
version = "2.2.1"
version = "2.3.0"

project_id = local.data_governance_project_id
labels = { environment = "dev" }
Expand Down
2 changes: 1 addition & 1 deletion examples/standalone/workloads.tf
Original file line number Diff line number Diff line change
Expand Up @@ -247,7 +247,7 @@ resource "google_bigquery_table" "credit_card" {
*/
module "kek_wrapping_key" {
source = "terraform-google-modules/kms/google"
version = "2.2.1"
version = "2.3.0"

project_id = module.harness_projects.data_governance_project_id
labels = { environment = "dev" }
Expand Down
2 changes: 1 addition & 1 deletion modules/data-governance/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ resource "random_id" "suffix" {

module "cmek" {
source = "terraform-google-modules/kms/google"
version = "2.2.1"
version = "2.3.0"

project_id = var.data_governance_project_id
labels = var.labels
Expand Down
4 changes: 2 additions & 2 deletions modules/data-ingestion-sa/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ locals {
//Dataflow controller service account
module "dataflow_controller_service_account" {
source = "terraform-google-modules/service-accounts/google"
version = "4.1.1"
version = "4.4.0"

project_id = var.data_ingestion_project_id
names = ["sa-dataflow-controller"]
Expand Down Expand Up @@ -97,7 +97,7 @@ resource "google_service_account" "pubsub_writer_service_account" {
// Cloud Function service account
module "cloudfunction_controller_service_account" {
source = "terraform-google-modules/service-accounts/google"
version = "4.2"
version = "4.4"

project_id = var.data_ingestion_project_id
names = ["sa-cloudfunction-controller"]
Expand Down
4 changes: 2 additions & 2 deletions modules/data-ingestion/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ resource "random_id" "suffix" {
//storage data ingestion bucket
module "data_ingestion_bucket" {
source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket"
version = "3.4.0"
version = "3.4.1"

project_id = var.data_ingestion_project_id
labels = var.labels
Expand All @@ -38,7 +38,7 @@ module "data_ingestion_bucket" {

module "dataflow_bucket" {
source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket"
version = "3.4.0"
version = "3.4.1"

project_id = var.data_ingestion_project_id
labels = var.labels
Expand Down
2 changes: 1 addition & 1 deletion modules/harness-artifact-registry/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ resource "random_id" "project_id_suffix" {

module "external_flex_template_project" {
source = "terraform-google-modules/project-factory/google"
version = "14.0"
version = "14.5"

name = local.project_name
random_project_id = "true"
Expand Down
6 changes: 3 additions & 3 deletions modules/harness-logging/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ data "google_storage_project_service_account" "gcs_account" {

module "cmek" {
source = "terraform-google-modules/kms/google"
version = "2.2.1"
version = "2.3.0"
count = var.create_bucket ? 1 : 0

project_id = var.kms_project_id
Expand All @@ -54,7 +54,7 @@ module "cmek" {

module "logging_bucket" {
source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket"
version = "3.4.0"
version = "3.4.1"

count = var.create_bucket ? 1 : 0

Expand All @@ -69,7 +69,7 @@ module "logging_bucket" {

module "log_export" {
source = "terraform-google-modules/log-export/google"
version = "7.4.2"
version = "7.8.2"

for_each = var.projects_ids

Expand Down
6 changes: 3 additions & 3 deletions modules/harness-projects/dns.tf
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ resource "google_dns_policy" "default_policy" {

module "restricted_googleapis" {
source = "terraform-google-modules/cloud-dns/google"
version = "4.1.0"
version = "4.2.1"
project_id = module.data_ingestion_project.project_id
type = "private"
name = "dz-e-shared-restricted-apis"
Expand Down Expand Up @@ -76,7 +76,7 @@ module "restricted_googleapis" {

module "restricted_gcr" {
source = "terraform-google-modules/cloud-dns/google"
version = "4.1.0"
version = "4.2.1"
project_id = module.data_ingestion_project.project_id
type = "private"
name = "dz-e-shared-restricted-gcr"
Expand Down Expand Up @@ -109,7 +109,7 @@ module "restricted_gcr" {

module "restricted_pkg_dev" {
source = "terraform-google-modules/cloud-dns/google"
version = "4.1.0"
version = "4.2.1"
project_id = module.data_ingestion_project.project_id
type = "private"
name = "dz-e-shared-restricted-pkg-dev"
Expand Down
6 changes: 3 additions & 3 deletions modules/harness-projects/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ resource "random_id" "project_id_suffix" {

module "data_ingestion_project" {
source = "terraform-google-modules/project-factory/google"
version = "14.0"
version = "14.5"

name = local.data_ingestion_project_name
random_project_id = "true"
Expand Down Expand Up @@ -65,7 +65,7 @@ module "data_ingestion_project" {

module "data_governance_project" {
source = "terraform-google-modules/project-factory/google"
version = "14.0"
version = "14.5"

name = local.data_governance_project_name
random_project_id = "true"
Expand Down Expand Up @@ -95,7 +95,7 @@ module "data_governance_project" {

module "data_project" {
source = "terraform-google-modules/project-factory/google"
version = "14.0"
version = "14.5"

name = local.data_project_name
random_project_id = "true"
Expand Down
8 changes: 4 additions & 4 deletions modules/organization-policies/compute.tf
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ locals {

module "boolean_compute_org_policies" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.0"
version = "5.4.0"
for_each = local.boolean_compute_org_policies

policy_for = "project"
Expand All @@ -39,7 +39,7 @@ module "boolean_compute_org_policies" {

module "protocol_forwarding_creation" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"

policy_for = "project"
project_id = var.project_id
Expand All @@ -51,7 +51,7 @@ module "protocol_forwarding_creation" {

module "restrict_shared_vpc_subnetworks_policy" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"
count = length(var.trusted_shared_vpc_subnetworks) > 0 ? 1 : 0

policy_for = "project"
Expand All @@ -64,7 +64,7 @@ module "restrict_shared_vpc_subnetworks_policy" {

module "vm_external_ip_access" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"

policy_for = "project"
project_id = var.project_id
Expand Down
6 changes: 3 additions & 3 deletions modules/organization-policies/gcp.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ locals {

module "location_restriction_policy" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"

policy_for = "project"
project_id = var.project_id
Expand All @@ -32,7 +32,7 @@ module "location_restriction_policy" {

module "org_domain_restricted_sharing" {
source = "terraform-google-modules/org-policy/google//modules/domain_restricted_sharing"
version = "5.2.2"
version = "5.4.0"
count = length(var.domains_to_allow) == 0 ? 0 : 1

policy_for = "project"
Expand All @@ -43,7 +43,7 @@ module "org_domain_restricted_sharing" {

module "restricted_non_cmek_services" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"
count = length(var.restricted_non_cmek_services) > 0 ? 1 : 0

policy_for = "project"
Expand Down
2 changes: 1 addition & 1 deletion modules/organization-policies/iam.tf
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ locals {

module "boolean_iam_org_policies" {
source = "terraform-google-modules/org-policy/google"
version = "5.2.2"
version = "5.4.0"
for_each = local.boolean_iam_org_policies

policy_for = "project"
Expand Down
2 changes: 1 addition & 1 deletion modules/vpc-sc-config/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ resource "random_id" "suffix" {

module "access_level_policy" {
source = "terraform-google-modules/vpc-service-controls/google//modules/access_level"
version = "5.0"
version = "5.2"
policy = var.access_context_manager_policy_id
name = local.access_policy_name
description = "policy with all available options to configure"
Expand Down