Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 6b231e2

Browse files
authoredJan 7, 2025··
Update dependencies to support AWS v5 provider versions (#17)
1 parent d32c7b3 commit 6b231e2

File tree

9 files changed

+19
-19
lines changed

9 files changed

+19
-19
lines changed
 

‎deploy.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module "deploy_role" {
2-
source = "github.com/thoughtbot/terraform-eks-cicd//modules/github-actions-eks-deploy-role?ref=v0.2.0"
2+
source = "github.com/thoughtbot/terraform-eks-cicd//modules/github-actions-eks-deploy-role?ref=v0.3.0"
33

44
cluster_names = var.cluster_names
55
github_branches = var.github_branches

‎main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ module "sso_roles" {
33
}
44

55
module "pod_role" {
6-
source = "github.com/thoughtbot/flightdeck//aws/service-account-role?ref=v0.9.0"
6+
source = "github.com/thoughtbot/flightdeck//aws/service-account-role?ref=v0.11.0"
77

88
cluster_names = var.cluster_names
99
name = "${local.instance_name}-pods"
@@ -12,21 +12,21 @@ module "pod_role" {
1212

1313
module "pod_policy" {
1414
count = var.s3_enabled ? 1 : 0
15-
source = "github.com/thoughtbot/flightdeck//aws/service-account-policy?ref=v0.9.0"
15+
source = "github.com/thoughtbot/flightdeck//aws/service-account-policy?ref=v0.11.0"
1616

1717
name = "${local.instance_name}-pods"
1818
policy_documents = module.s3_bucket[*].policy_json
1919
role_names = [module.pod_role.name]
2020
}
2121

2222
module "cluster" {
23-
source = "github.com/thoughtbot/flightdeck//aws/cluster-name?ref=v0.9.0"
23+
source = "github.com/thoughtbot/flightdeck//aws/cluster-name?ref=v0.11.0"
2424

2525
name = var.cluster_names[0]
2626
}
2727

2828
module "network" {
29-
source = "github.com/thoughtbot/flightdeck//aws/network-data?ref=v0.9.0"
29+
source = "github.com/thoughtbot/flightdeck//aws/network-data?ref=v0.11.0"
3030

3131
tags = module.cluster.shared_tags
3232
}

‎modules/opensearch/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -444,7 +444,7 @@ resource "aws_vpc_security_group_egress_rule" "this" {
444444
}
445445

446446
module "elasticsearch_secret" {
447-
source = "github.com/thoughtbot/terraform-aws-secrets//secret?ref=v0.4.0"
447+
source = "github.com/thoughtbot/terraform-aws-secrets//secret?ref=v0.8.0"
448448

449449
admin_principals = var.admin_principals
450450
description = "Elastisearch secrets for: ${var.application_name}"

‎opensearch.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ data "aws_iam_policy_document" "ecs_osis_access" {
161161

162162
module "es_pod_policy" {
163163
count = var.elasticsearch_enabled ? 1 : 0
164-
source = "github.com/thoughtbot/flightdeck//aws/service-account-policy?ref=v0.9.0"
164+
source = "github.com/thoughtbot/flightdeck//aws/service-account-policy?ref=v0.11.0"
165165

166166
name = "es-${var.es_application_name}-pods"
167167
policy_documents = concat(

‎postgres.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "postgres" {
22
count = var.postgres_enabled ? 1 : 0
3-
source = "github.com/thoughtbot/terraform-aws-databases//rds-postgres/primary-instance?ref=v0.4.0"
3+
source = "github.com/thoughtbot/terraform-aws-databases//rds-postgres/primary-instance?ref=v0.6.0"
44

55
admin_username = var.postgres_admin_username
66
allocated_storage = var.postgres_allocated_storage
@@ -28,7 +28,7 @@ resource "random_id" "parameter_group" {
2828

2929
module "postgres_admin_login" {
3030
count = var.postgres_enabled ? 1 : 0
31-
source = "github.com/thoughtbot/terraform-aws-databases//rds-postgres/admin-login?ref=v0.4.0"
31+
source = "github.com/thoughtbot/terraform-aws-databases//rds-postgres/admin-login?ref=v0.6.0"
3232

3333
database_name = module.postgres[count.index].default_database
3434
identifier = module.postgres[count.index].identifier
@@ -43,7 +43,7 @@ module "postgres_admin_login" {
4343

4444
module "postgres_policy" {
4545
count = var.postgres_enabled ? 1 : 0
46-
source = "github.com/thoughtbot/terraform-aws-secrets//read-secret-policy?ref=v0.6.0"
46+
source = "github.com/thoughtbot/terraform-aws-secrets//read-secret-policy?ref=v0.8.0"
4747

4848
policy_name = "${local.instance_name}-postgres"
4949
role_names = [module.pod_role.name]

‎redis.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "redis" {
22
count = var.redis_enabled ? 1 : 0
3-
source = "github.com/thoughtbot/terraform-aws-databases//elasticache-redis/replication-group?ref=v0.4.0"
3+
source = "github.com/thoughtbot/terraform-aws-databases//elasticache-redis/replication-group?ref=v0.6.0"
44

55
allowed_cidr_blocks = [module.network.vpc.cidr_block]
66
description = "Redis cluster for ${local.instance_name} jobs"
@@ -14,7 +14,7 @@ module "redis" {
1414

1515
module "redis_token" {
1616
count = var.redis_enabled ? 1 : 0
17-
source = "github.com/thoughtbot/terraform-aws-databases//elasticache-redis/auth-token?ref=v0.4.0"
17+
source = "github.com/thoughtbot/terraform-aws-databases//elasticache-redis/auth-token?ref=v0.6.0"
1818

1919
initial_auth_token = module.redis[count.index].initial_auth_token
2020
replication_group_id = module.redis[count.index].id
@@ -26,7 +26,7 @@ module "redis_token" {
2626

2727
module "redis_policy" {
2828
count = var.redis_enabled ? 1 : 0
29-
source = "github.com/thoughtbot/terraform-aws-secrets//read-secret-policy?ref=v0.6.0"
29+
source = "github.com/thoughtbot/terraform-aws-secrets//read-secret-policy?ref=v0.8.0"
3030

3131
policy_name = "${local.instance_name}-redis"
3232
role_names = [module.pod_role.name]

‎s3.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "s3_bucket" {
22
count = var.s3_enabled ? 1 : 0
3-
source = "github.com/thoughtbot/terraform-s3-bucket?ref=v0.3.0"
3+
source = "github.com/thoughtbot/terraform-s3-bucket?ref=v0.4.0"
44

55
name = var.s3_bucket_name
66
read_principals = concat(local.read_principals, var.s3_read_principals)

‎secrets.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "secret_key" {
22
count = var.generate_secret_key ? 1 : 0
3-
source = "github.com/thoughtbot/terraform-aws-secrets//random-secret?ref=v0.6.0"
3+
source = "github.com/thoughtbot/terraform-aws-secrets//random-secret?ref=v0.8.0"
44

55
description = "Secret key for ${local.instance_name}"
66
environment_variables = [var.secret_key_variable]
@@ -11,7 +11,7 @@ module "secret_key" {
1111

1212
module "secret_key_policy" {
1313
count = var.generate_secret_key ? 1 : 0
14-
source = "github.com/thoughtbot/terraform-aws-secrets//read-secret-policy?ref=v0.6.0"
14+
source = "github.com/thoughtbot/terraform-aws-secrets//read-secret-policy?ref=v0.8.0"
1515

1616
policy_name = "${local.instance_name}-secret-key"
1717
role_names = [module.pod_role.name]
@@ -21,7 +21,7 @@ module "secret_key_policy" {
2121
module "developer_managed_secrets" {
2222
for_each = var.developer_managed_secrets
2323

24-
source = "github.com/thoughtbot/terraform-aws-secrets//user-managed-secret?ref=v0.5.0"
24+
source = "github.com/thoughtbot/terraform-aws-secrets//user-managed-secret?ref=v0.8.0"
2525

2626
description = "Developer-managed ${each.key} secrets for ${local.instance_name}"
2727
environment_variables = each.value
@@ -31,7 +31,7 @@ module "developer_managed_secrets" {
3131
}
3232

3333
module "developer_managed_secrets_policy" {
34-
source = "github.com/thoughtbot/terraform-aws-secrets//read-secret-policy?ref=v0.6.0"
34+
source = "github.com/thoughtbot/terraform-aws-secrets//read-secret-policy?ref=v0.8.0"
3535

3636
policy_name = "${local.instance_name}-managed-secrets"
3737
role_names = [module.pod_role.name]

‎sentry.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "sentry_dsn" {
22
count = var.sentry_enabled ? 1 : 0
3-
source = "github.com/thoughtbot/terraform-aws-sentry-dsn?ref=v0.3.0"
3+
source = "github.com/thoughtbot/terraform-aws-sentry-dsn?ref=v0.4.0"
44

55
name = var.sentry_project
66
organization_slug = var.sentry_organization

0 commit comments

Comments
 (0)
Please sign in to comment.