@@ -44,7 +44,7 @@ resource "aws_s3_bucket_public_access_block" "csv_bucket" {
4444}
4545
4646module "csv_bucket_logs" {
47- source = " github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3 "
47+ source = " github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5 "
4848
4949 bucket_name = " notification-canada-ca-${ var . env } -csv-upload-logs"
5050 force_destroy = var. force_destroy_s3
@@ -218,7 +218,7 @@ resource "aws_s3_bucket_public_access_block" "scan_files_document_bucket" {
218218}
219219
220220module "document_download_logs" {
221- source = " github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3 "
221+ source = " github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5 "
222222
223223 bucket_name = " notification-canada-ca-${ var . env } -document-download-logs"
224224 force_destroy = var. force_destroy_s3
@@ -351,7 +351,7 @@ resource "aws_s3_bucket_public_access_block" "athena_bucket" {
351351}
352352
353353module "athena_logs_bucket" {
354- source = " github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3 "
354+ source = " github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5 "
355355
356356 bucket_name = " notification-canada-ca-${ var . env } -athena-logs"
357357 force_destroy = var. force_destroy_s3
@@ -365,7 +365,7 @@ module "athena_logs_bucket" {
365365}
366366
367367module "cbs_logs_bucket" {
368- source = " github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3 "
368+ source = " github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5 "
369369 count = var. create_cbs_bucket ? 1 : 0
370370
371371 bucket_name = var. cbs_satellite_bucket_name
@@ -382,7 +382,7 @@ module "cbs_logs_bucket" {
382382}
383383
384384module "sns_sms_usage_report_bucket" {
385- source = " github.com/cds-snc/terraform-modules//S3?ref=v9.2.3 "
385+ source = " github.com/cds-snc/terraform-modules//S3?ref=v9.6.4 "
386386
387387 bucket_name = " notification-canada-ca-${ var . env } -sms-usage-logs"
388388 force_destroy = var. force_destroy_s3
@@ -462,7 +462,7 @@ module "sns_sms_usage_report_bucket_us_west_2" {
462462 aws = aws.us- west- 2
463463 }
464464
465- source = " github.com/cds-snc/terraform-modules//S3?ref=v9.2.3 "
465+ source = " github.com/cds-snc/terraform-modules//S3?ref=v9.6.4 "
466466
467467 bucket_name = " notification-canada-ca-${ var . env } -sms-usage-west-2-logs"
468468 force_destroy = var. force_destroy_s3
@@ -540,7 +540,7 @@ POLICY
540540}
541541
542542module "sns_sms_usage_report_sanitized_bucket" {
543- source = " github.com/cds-snc/terraform-modules//S3?ref=v9.2.3 "
543+ source = " github.com/cds-snc/terraform-modules//S3?ref=v9.6.4 "
544544
545545 bucket_name = " notification-canada-ca-${ var . env } -sms-usage-logs-san"
546546 force_destroy = var. force_destroy_s3
@@ -557,7 +557,7 @@ module "sns_sms_usage_report_sanitized_bucket_us_west_2" {
557557 aws = aws.us- west- 2
558558 }
559559
560- source = " github.com/cds-snc/terraform-modules//S3?ref=v9.2.3 "
560+ source = " github.com/cds-snc/terraform-modules//S3?ref=v9.6.4 "
561561
562562 bucket_name = " notification-canada-ca-${ var . env } -sms-usage-west-2-logs-san"
563563 force_destroy = var. force_destroy_s3
0 commit comments