Skip to content

Commit 026a281

Browse files
authored
feat: Qi common upgrade to v4 (#3637)
upgrade to v4
1 parent 72021e5 commit 026a281

File tree

10 files changed

+111
-102
lines changed

10 files changed

+111
-102
lines changed

src/domains/qi-common/.terraform.lock.hcl

Lines changed: 58 additions & 42 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/domains/qi-common/00_azuread.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ data "azuread_group" "adgroup_operations" {
1919
display_name = "${local.product}-adgroup-operations"
2020
}
2121

22-
# Acccording to
22+
# Acccording to
2323
# Application Insights API Keys are deprecated and will be retired in March 2026. Please consider using API Accesss with Azure AD. Learn more about API Access with Azure AD
2424
# https://learn.microsoft.com/en-us/azure/azure-monitor/app/azure-ad-authentication?tabs=aspnetcore
2525

@@ -34,7 +34,7 @@ resource "azuread_application" "qi_app" {
3434
}
3535

3636
resource "azuread_service_principal" "qi_sp" {
37-
application_id = azuread_application.qi_app.application_id
37+
client_id = azuread_application.qi_app.client_id
3838
}
3939

4040
# https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#role-based-access-control-administrator
@@ -50,17 +50,17 @@ resource "time_rotating" "qi_application_time" {
5050
}
5151

5252
resource "azuread_application_password" "qi_app_pwd" {
53-
application_object_id = azuread_application.qi_app.object_id
54-
display_name = "managed by terraform"
55-
end_date_relative = "8640h" # 360 days
53+
application_id = azuread_application.qi_app.id
54+
display_name = "managed by terraform"
55+
end_date_relative = "8640h" # 360 days
5656
rotate_when_changed = {
5757
rotation = time_rotating.qi_application_time.id
5858
}
5959
}
6060

6161
resource "azurerm_key_vault_secret" "qi_service_principal_client_id" {
6262
name = "${local.product}-qi-client-id"
63-
value = azuread_service_principal.qi_sp.application_id
63+
value = azuread_service_principal.qi_sp.client_id
6464
content_type = "text/plain"
6565

6666
key_vault_id = module.key_vault.id

src/domains/qi-common/01_network.tf

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -50,23 +50,23 @@ data "azurerm_resource_group" "rg_event_private_dns_zone" {
5050

5151
# all snet for each evh(s)
5252
resource "azurerm_subnet" "eventhub_qi_snet" {
53-
name = "${local.project_itn}-evh-qi-snet"
54-
resource_group_name = data.azurerm_resource_group.rg_vnet_italy.name
55-
virtual_network_name = data.azurerm_virtual_network.vnet_italy.name
56-
address_prefixes = var.cidr_subnet_qi_evh
53+
name = "${local.project_itn}-evh-qi-snet"
54+
resource_group_name = data.azurerm_resource_group.rg_vnet_italy.name
55+
virtual_network_name = data.azurerm_virtual_network.vnet_italy.name
56+
address_prefixes = var.cidr_subnet_qi_evh
57+
private_endpoint_network_policies = "Enabled"
5758
}
5859

5960
module "cosmosdb_qi_snet" {
60-
source = "./.terraform/modules/__v3__/subnet"
61+
source = "./.terraform/modules/__v4__/subnet"
6162

6263
name = "${local.project}-cosmosb-snet"
6364
resource_group_name = local.vnet_resource_group_name
6465
virtual_network_name = local.vnet_name
6566

6667
address_prefixes = var.cidr_subnet_cosmosdb_qi
6768

68-
private_endpoint_network_policies_enabled = true
69-
69+
private_endpoint_network_policies = "Enabled"
7070
service_endpoints = [
7171
"Microsoft.Web",
7272
"Microsoft.AzureCosmosDB",

src/domains/qi-common/02_security.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ resource "azurerm_resource_group" "sec_rg" {
66
}
77

88
module "key_vault" {
9-
source = "./.terraform/modules/__v3__/key_vault"
9+
source = "./.terraform/modules/__v4__/key_vault"
1010

1111

1212
name = "${local.product}-${var.domain}-kv"
@@ -182,7 +182,7 @@ resource "azurerm_key_vault_secret" "qi_azurewebjobsstorage" {
182182
# create json letsencrypt inside kv
183183
# requierd: Docker
184184
module "letsencrypt_qi" {
185-
source = "./.terraform/modules/__v3__/letsencrypt_credential"
185+
source = "./.terraform/modules/__v4__/letsencrypt_credential"
186186

187187
prefix = var.prefix
188188
env = var.env_short

src/domains/qi-common/03_cosmosdb.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ resource "azurerm_resource_group" "cosmosdb_qi_rg" {
77

88
module "cosmosdb_account_qi_mongodb" {
99

10-
source = "./.terraform/modules/__v3__/cosmosdb_account"
10+
source = "./.terraform/modules/__v4__/cosmosdb_account"
1111

1212
name = "${local.project}-cosmos-account"
1313
location = var.location
@@ -85,7 +85,7 @@ locals {
8585

8686
module "cosmosdb_accounting_reconciliation_collections" {
8787

88-
source = "./.terraform/modules/__v3__/cosmosdb_mongodb_collection"
88+
source = "./.terraform/modules/__v4__/cosmosdb_mongodb_collection"
8989
for_each = { for index, coll in local.accounting_reconciliation_collections : coll.name => coll }
9090

9191
name = each.value.name

src/domains/qi-common/03_storage_account_fn.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ resource "azurerm_resource_group" "qi_rg" {
66
}
77

88
module "qi_fn_sa" {
9-
source = "./.terraform/modules/__v3__/storage_account"
9+
source = "./.terraform/modules/__v4__/storage_account"
1010

1111
name = replace(format("%s-fn-sa", local.project), "-", "")
1212
account_kind = var.qi_storage_params.kind

src/domains/qi-common/06_evh_qi.tf

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ resource "azurerm_resource_group" "qi_evh_resource_group" {
55
}
66

77
module "eventhub_namespace_qi" {
8-
source = "./.terraform/modules/__v3__/eventhub"
8+
source = "./.terraform/modules/__v4__/eventhub"
99
name = "${local.project_itn}-evh"
1010
location = var.location_itn
1111
resource_group_name = azurerm_resource_group.qi_evh_resource_group.name
@@ -15,20 +15,13 @@ module "eventhub_namespace_qi" {
1515
maximum_throughput_units = var.ehns_maximum_throughput_units
1616
#zone_redundat is always true
1717

18-
virtual_network_ids = [data.azurerm_virtual_network.vnet_italy.id]
1918
private_endpoint_subnet_id = azurerm_subnet.eventhub_qi_snet.id
2019
public_network_access_enabled = var.ehns_public_network_access
2120
private_endpoint_created = var.ehns_private_endpoint_is_present
2221

2322
private_endpoint_resource_group_name = azurerm_resource_group.qi_evh_resource_group.name
23+
private_dns_zones_ids = [data.azurerm_private_dns_zone.eventhub.id]
2424

25-
private_dns_zones = {
26-
id = [data.azurerm_private_dns_zone.eventhub.id]
27-
name = [data.azurerm_private_dns_zone.eventhub.name]
28-
resource_group_name = data.azurerm_resource_group.rg_event_private_dns_zone.name
29-
}
30-
31-
private_dns_zone_record_A_name = "${var.domain}.${var.location_short_itn}"
3225

3326
action = [
3427
{
@@ -48,7 +41,7 @@ module "eventhub_namespace_qi" {
4841
}
4942

5043
module "eventhub_qi_configuration" {
51-
source = "./.terraform/modules/__v3__/eventhub_configuration"
44+
source = "./.terraform/modules/__v4__/eventhub_configuration"
5245

5346
event_hub_namespace_name = module.eventhub_namespace_qi.name
5447
event_hub_namespace_resource_group_name = azurerm_resource_group.qi_evh_resource_group.name

src/domains/qi-common/10_github_identity.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ locals {
6363

6464
# create a module for each 20 repos
6565
module "identity_cd_01" {
66-
source = "github.com/pagopa/terraform-azurerm-v3//github_federated_identity"
66+
source = "./.terraform/modules/__v4__/github_federated_identity"
6767
# pagopa-<ENV><DOMAIN>-<COUNTER>-github-<PERMS>-identity
6868
prefix = var.prefix
6969
env_short = var.env_short
@@ -139,7 +139,7 @@ resource "null_resource" "github_runner_app_permissions_to_namespace_cd_01" {
139139
# WL-IDENTITY
140140
# https://pagopa.atlassian.net/wiki/spaces/DEVOPS/pages/1227751458/Migrazione+pod+Identity+vs+workload+Identity#Init-workload-identity
141141
module "workload_identity" {
142-
source = "./.terraform/modules/__v3__/kubernetes_workload_identity_init"
142+
source = "./.terraform/modules/__v4__/kubernetes_workload_identity_init"
143143

144144
workload_identity_name_prefix = var.domain
145145
workload_identity_resource_group_name = data.azurerm_kubernetes_cluster.aks.resource_group_name

src/domains/qi-common/99_main.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@ terraform {
22
required_providers {
33
azurerm = {
44
source = "hashicorp/azurerm"
5-
version = "<= 3.116.0"
5+
version = "~> 4.16"
66
}
77
azuread = {
88
source = "hashicorp/azuread"
9-
version = "= 2.38.0"
9+
version = "~> 3.1"
1010
}
1111
null = {
1212
source = "hashicorp/null"
@@ -29,7 +29,7 @@ data "azurerm_subscription" "current" {}
2929

3030
data "azurerm_client_config" "current" {}
3131

32-
module "__v3__" {
33-
# v8.62.1
34-
source = "git::https://github.com/pagopa/terraform-azurerm-v3?ref=f3485105e35ce8c801209dcbb4ef72f3d944f0e5"
35-
}
32+
module "__v4__" {
33+
# v8.5.3
34+
source = "git::https://github.com/pagopa/terraform-azurerm-v4?ref=e014df915dd8cb6d112b3424abcf5252e78979c9"
35+
}

0 commit comments

Comments
 (0)