Skip to content

Commit

Permalink
chore(deps): update all minor dependencies
Browse files Browse the repository at this point in the history
  • Loading branch information
renovate[bot] authored Sep 10, 2024
1 parent 93b733b commit bd22d49
Show file tree
Hide file tree
Showing 15 changed files with 27 additions and 27 deletions.
2 changes: 1 addition & 1 deletion aws/common/budget.tf
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ resource "aws_budgets_budget" "notify_global" {
}

module "budget_notifier" {
source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.2.6"
source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.6.4"
daily_spend_notifier_hook = var.budget_sre_bot_webhook
weekly_spend_notifier_hook = var.budget_sre_bot_webhook
billing_tag_value = "notification-canada-ca-${var.env}"
Expand Down
16 changes: 8 additions & 8 deletions aws/common/s3.tf
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ resource "aws_s3_bucket_public_access_block" "csv_bucket" {
}

module "csv_bucket_logs" {
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3"
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5"

bucket_name = "notification-canada-ca-${var.env}-csv-upload-logs"
force_destroy = var.force_destroy_s3
Expand Down Expand Up @@ -218,7 +218,7 @@ resource "aws_s3_bucket_public_access_block" "scan_files_document_bucket" {
}

module "document_download_logs" {
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3"
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5"

bucket_name = "notification-canada-ca-${var.env}-document-download-logs"
force_destroy = var.force_destroy_s3
Expand Down Expand Up @@ -351,7 +351,7 @@ resource "aws_s3_bucket_public_access_block" "athena_bucket" {
}

module "athena_logs_bucket" {
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3"
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5"

bucket_name = "notification-canada-ca-${var.env}-athena-logs"
force_destroy = var.force_destroy_s3
Expand All @@ -365,7 +365,7 @@ module "athena_logs_bucket" {
}

module "cbs_logs_bucket" {
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3"
source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5"
count = var.create_cbs_bucket ? 1 : 0

bucket_name = var.cbs_satellite_bucket_name
Expand All @@ -382,7 +382,7 @@ module "cbs_logs_bucket" {
}

module "sns_sms_usage_report_bucket" {
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3"
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"

bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs"
force_destroy = var.force_destroy_s3
Expand Down Expand Up @@ -462,7 +462,7 @@ module "sns_sms_usage_report_bucket_us_west_2" {
aws = aws.us-west-2
}

source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3"
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"

bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs"
force_destroy = var.force_destroy_s3
Expand Down Expand Up @@ -540,7 +540,7 @@ POLICY
}

module "sns_sms_usage_report_sanitized_bucket" {
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3"
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"

bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs-san"
force_destroy = var.force_destroy_s3
Expand All @@ -557,7 +557,7 @@ module "sns_sms_usage_report_sanitized_bucket_us_west_2" {
aws = aws.us-west-2
}

source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3"
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"

bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs-san"
force_destroy = var.force_destroy_s3
Expand Down
8 changes: 4 additions & 4 deletions aws/common/slack.tf
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# Doc: https://registry.terraform.io/modules/terraform-aws-modules/notify-slack/aws/
module "notify_slack_warning" {
source = "terraform-aws-modules/notify-slack/aws"
version = "6.0.0"
version = "6.4.1"

create_sns_topic = false
sns_topic_name = aws_sns_topic.notification-canada-ca-alert-warning.name
Expand All @@ -19,7 +19,7 @@ module "notify_slack_warning" {

module "notify_slack_ok" {
source = "terraform-aws-modules/notify-slack/aws"
version = "6.0.0"
version = "6.4.1"

create_sns_topic = false
sns_topic_name = aws_sns_topic.notification-canada-ca-alert-ok.name
Expand All @@ -37,7 +37,7 @@ module "notify_slack_ok" {

module "notify_slack_critical" {
source = "terraform-aws-modules/notify-slack/aws"
version = "6.0.0"
version = "6.4.1"

create_sns_topic = false
sns_topic_name = aws_sns_topic.notification-canada-ca-alert-critical.name
Expand All @@ -56,7 +56,7 @@ module "notify_slack_critical" {
# Shared generic slack webhook & topic.
module "notify_slack_general" {
source = "terraform-aws-modules/notify-slack/aws"
version = "6.0.0"
version = "6.4.1"

create_sns_topic = false
sns_topic_name = aws_sns_topic.notification-canada-ca-alert-general.name
Expand Down
2 changes: 1 addition & 1 deletion aws/eks/iam.tf
Original file line number Diff line number Diff line change
Expand Up @@ -228,7 +228,7 @@ data "aws_iam_policy" "ssm_managed_instance" {

module "iam_assumable_role_karpenter" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.28.0"
version = "5.44.0"
create_role = true
role_name = "karpenter-controller-eks"
provider_url = data.aws_eks_cluster.notify_cluster.identity[0].oidc[0].issuer
Expand Down
2 changes: 1 addition & 1 deletion aws/eks/sentinel.tf
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ locals {
# see https://github.com/cds-snc/terraform-modules/issues/203
# and https://docs.google.com/document/d/16LLelZ7WEKrnbocrl0Az74JqkCv5DBZ9QILRBUFJQt8/edit#heading=h.z87ipkd84djw
module "sentinel_forwarder" {
source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.4.2"
source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.6.4"
function_name = "sentinel-cloud-watch-forwarder"
billing_tag_value = "notification-canada-ca-${var.env}"

Expand Down
2 changes: 1 addition & 1 deletion aws/eks/vpn.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
# access to the private subnets.
#
module "vpn" {
source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.5.3"
source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.4"

endpoint_name = "private-subnets"
access_group_id = var.client_vpn_access_group_id
Expand Down
2 changes: 1 addition & 1 deletion aws/heartbeat/lambda.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ locals {
}

module "heartbeat" {
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.0.4"
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.4"
name = "heartbeat"
billing_tag_value = var.billing_tag_value
ecr_arn = var.heartbeat_ecr_arn
Expand Down
2 changes: 1 addition & 1 deletion aws/pinpoint_to_sqs_sms_callbacks/lambda.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
module "pinpoint_to_sqs_sms_callbacks" {
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3"
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3"
name = "pinpoint_to_sqs_sms_callbacks"
billing_tag_value = var.billing_tag_value
ecr_arn = var.pinpoint_to_sqs_sms_callbacks_ecr_arn
Expand Down
2 changes: 1 addition & 1 deletion aws/ses_receiving_emails/lambda.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ module "ses_receiving_emails" {
aws = aws.us-east-1
}

source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3"
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3"
name = "ses_receiving_emails"
billing_tag_value = var.billing_tag_value
ecr_arn = var.ses_receiving_emails_ecr_arn
Expand Down
2 changes: 1 addition & 1 deletion aws/ses_to_sqs_email_callbacks/lambda.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
module "ses_to_sqs_email_callbacks" {
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3"
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3"
name = "ses_to_sqs_email_callbacks"
billing_tag_value = var.billing_tag_value
ecr_arn = var.ses_to_sqs_email_callbacks_ecr_arn
Expand Down
2 changes: 1 addition & 1 deletion aws/sns_to_sqs_sms_callbacks/lambda.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
module "sns_to_sqs_sms_callbacks" {
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3"
source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3"
name = "sns_to_sqs_sms_callbacks"
billing_tag_value = var.billing_tag_value
ecr_arn = var.sns_to_sqs_sms_callbacks_ecr_arn
Expand Down
2 changes: 1 addition & 1 deletion aws/system_status/lambda.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ locals {
}

module "system_status" {
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.0.4"
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.4"
name = "system_status"
billing_tag_value = var.billing_tag_value
ecr_arn = var.system_status_ecr_arn
Expand Down
2 changes: 1 addition & 1 deletion aws/system_status_static_site/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ variable "billing_tag_value" {
}

module "system_status_static_site" {
source = "github.com/cds-snc/terraform-modules//simple_static_website?ref=v9.5.3"
source = "github.com/cds-snc/terraform-modules//simple_static_website?ref=v9.6.4"

domain_name_source = var.env == "production" ? "status.notification.canada.ca" : "status.${var.env}.notification.cdssandbox.xyz"
billing_tag_value = var.billing_tag_value
Expand Down
6 changes: 3 additions & 3 deletions scripts/sanitize_sms_usage_logs/requirements.txt
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
boto3==1.34.25
fsspec==2024.5.0
boto3==1.35.10
fsspec==2024.6.1
pandas==2.2.2
python-dotenv==1.0.1
s3fs==2024.5.0
s3fs==2024.6.1
2 changes: 1 addition & 1 deletion scripts/set_sms_keywords/requirements.txt
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
boto3==1.34.25
boto3==1.35.10
python-dotenv==1.0.1

0 comments on commit bd22d49

Please sign in to comment.