Skip to content

Commit 1638ba8

Browse files
chore(deps): update all minor dependencies
1 parent 7e0d6b7 commit 1638ba8

File tree

15 files changed

+27
-27
lines changed

15 files changed

+27
-27
lines changed

aws/common/budget.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ resource "aws_budgets_budget" "notify_global" {
2424
}
2525

2626
module "budget_notifier" {
27-
source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.2.6"
27+
source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.6.4"
2828
daily_spend_notifier_hook = var.budget_sre_bot_webhook
2929
weekly_spend_notifier_hook = var.budget_sre_bot_webhook
3030
billing_tag_value = "notification-canada-ca-${var.env}"

aws/common/s3.tf

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ resource "aws_s3_bucket_public_access_block" "csv_bucket" {
4444
}
4545

4646
module "csv_bucket_logs" {
47-
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3"
47+
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5"
4848

4949
bucket_name = "notification-canada-ca-${var.env}-csv-upload-logs"
5050
force_destroy = var.force_destroy_s3
@@ -218,7 +218,7 @@ resource "aws_s3_bucket_public_access_block" "scan_files_document_bucket" {
218218
}
219219

220220
module "document_download_logs" {
221-
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3"
221+
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5"
222222

223223
bucket_name = "notification-canada-ca-${var.env}-document-download-logs"
224224
force_destroy = var.force_destroy_s3
@@ -351,7 +351,7 @@ resource "aws_s3_bucket_public_access_block" "athena_bucket" {
351351
}
352352

353353
module "athena_logs_bucket" {
354-
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3"
354+
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5"
355355

356356
bucket_name = "notification-canada-ca-${var.env}-athena-logs"
357357
force_destroy = var.force_destroy_s3
@@ -365,7 +365,7 @@ module "athena_logs_bucket" {
365365
}
366366

367367
module "cbs_logs_bucket" {
368-
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3"
368+
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5"
369369
count = var.create_cbs_bucket ? 1 : 0
370370

371371
bucket_name = var.cbs_satellite_bucket_name
@@ -382,7 +382,7 @@ module "cbs_logs_bucket" {
382382
}
383383

384384
module "sns_sms_usage_report_bucket" {
385-
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3"
385+
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"
386386

387387
bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs"
388388
force_destroy = var.force_destroy_s3
@@ -462,7 +462,7 @@ module "sns_sms_usage_report_bucket_us_west_2" {
462462
aws = aws.us-west-2
463463
}
464464

465-
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3"
465+
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"
466466

467467
bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs"
468468
force_destroy = var.force_destroy_s3
@@ -540,7 +540,7 @@ POLICY
540540
}
541541

542542
module "sns_sms_usage_report_sanitized_bucket" {
543-
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3"
543+
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"
544544

545545
bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs-san"
546546
force_destroy = var.force_destroy_s3
@@ -557,7 +557,7 @@ module "sns_sms_usage_report_sanitized_bucket_us_west_2" {
557557
aws = aws.us-west-2
558558
}
559559

560-
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3"
560+
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"
561561

562562
bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs-san"
563563
force_destroy = var.force_destroy_s3

aws/common/slack.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Doc: https://registry.terraform.io/modules/terraform-aws-modules/notify-slack/aws/
22
module "notify_slack_warning" {
33
source = "terraform-aws-modules/notify-slack/aws"
4-
version = "6.0.0"
4+
version = "6.5.0"
55

66
create_sns_topic = false
77
sns_topic_name = aws_sns_topic.notification-canada-ca-alert-warning.name
@@ -19,7 +19,7 @@ module "notify_slack_warning" {
1919

2020
module "notify_slack_ok" {
2121
source = "terraform-aws-modules/notify-slack/aws"
22-
version = "6.0.0"
22+
version = "6.5.0"
2323

2424
create_sns_topic = false
2525
sns_topic_name = aws_sns_topic.notification-canada-ca-alert-ok.name
@@ -37,7 +37,7 @@ module "notify_slack_ok" {
3737

3838
module "notify_slack_critical" {
3939
source = "terraform-aws-modules/notify-slack/aws"
40-
version = "6.0.0"
40+
version = "6.5.0"
4141

4242
create_sns_topic = false
4343
sns_topic_name = aws_sns_topic.notification-canada-ca-alert-critical.name
@@ -56,7 +56,7 @@ module "notify_slack_critical" {
5656
# Shared generic slack webhook & topic.
5757
module "notify_slack_general" {
5858
source = "terraform-aws-modules/notify-slack/aws"
59-
version = "6.0.0"
59+
version = "6.5.0"
6060

6161
create_sns_topic = false
6262
sns_topic_name = aws_sns_topic.notification-canada-ca-alert-general.name

aws/eks/iam.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -228,7 +228,7 @@ data "aws_iam_policy" "ssm_managed_instance" {
228228

229229
module "iam_assumable_role_karpenter" {
230230
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
231-
version = "5.28.0"
231+
version = "5.44.0"
232232
create_role = true
233233
role_name = "karpenter-controller-eks"
234234
provider_url = data.aws_eks_cluster.notify_cluster.identity[0].oidc[0].issuer

aws/eks/sentinel.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ locals {
88
# see https://github.com/cds-snc/terraform-modules/issues/203
99
# and https://docs.google.com/document/d/16LLelZ7WEKrnbocrl0Az74JqkCv5DBZ9QILRBUFJQt8/edit#heading=h.z87ipkd84djw
1010
module "sentinel_forwarder" {
11-
source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.4.2"
11+
source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.6.4"
1212
function_name = "sentinel-cloud-watch-forwarder"
1313
billing_tag_value = "notification-canada-ca-${var.env}"
1414

aws/eks/vpn.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
# access to the private subnets.
44
#
55
module "vpn" {
6-
source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.5.3"
6+
source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.4"
77

88
endpoint_name = "private-subnets"
99
access_group_id = var.client_vpn_access_group_id

aws/heartbeat/lambda.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ locals {
33
}
44

55
module "heartbeat" {
6-
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.0.4"
6+
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.4"
77
name = "heartbeat"
88
billing_tag_value = var.billing_tag_value
99
ecr_arn = var.heartbeat_ecr_arn

aws/pinpoint_to_sqs_sms_callbacks/lambda.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module "pinpoint_to_sqs_sms_callbacks" {
2-
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3"
2+
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3"
33
name = "pinpoint_to_sqs_sms_callbacks"
44
billing_tag_value = var.billing_tag_value
55
ecr_arn = var.pinpoint_to_sqs_sms_callbacks_ecr_arn

aws/ses_receiving_emails/lambda.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ module "ses_receiving_emails" {
44
aws = aws.us-east-1
55
}
66

7-
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3"
7+
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3"
88
name = "ses_receiving_emails"
99
billing_tag_value = var.billing_tag_value
1010
ecr_arn = var.ses_receiving_emails_ecr_arn

aws/ses_to_sqs_email_callbacks/lambda.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module "ses_to_sqs_email_callbacks" {
2-
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3"
2+
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3"
33
name = "ses_to_sqs_email_callbacks"
44
billing_tag_value = var.billing_tag_value
55
ecr_arn = var.ses_to_sqs_email_callbacks_ecr_arn

0 commit comments

Comments
 (0)