diff --git a/aws/common/budget.tf b/aws/common/budget.tf index 0672f47bd..9373c7a27 100644 --- a/aws/common/budget.tf +++ b/aws/common/budget.tf @@ -24,7 +24,7 @@ resource "aws_budgets_budget" "notify_global" { } module "budget_notifier" { - source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.2.6" + source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.6.4" daily_spend_notifier_hook = var.budget_sre_bot_webhook weekly_spend_notifier_hook = var.budget_sre_bot_webhook billing_tag_value = "notification-canada-ca-${var.env}" diff --git a/aws/common/s3.tf b/aws/common/s3.tf index 0823c8130..770dffbb7 100644 --- a/aws/common/s3.tf +++ b/aws/common/s3.tf @@ -44,7 +44,7 @@ resource "aws_s3_bucket_public_access_block" "csv_bucket" { } module "csv_bucket_logs" { - source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3" + source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5" bucket_name = "notification-canada-ca-${var.env}-csv-upload-logs" force_destroy = var.force_destroy_s3 @@ -218,7 +218,7 @@ resource "aws_s3_bucket_public_access_block" "scan_files_document_bucket" { } module "document_download_logs" { - source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3" + source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5" bucket_name = "notification-canada-ca-${var.env}-document-download-logs" force_destroy = var.force_destroy_s3 @@ -351,7 +351,7 @@ resource "aws_s3_bucket_public_access_block" "athena_bucket" { } module "athena_logs_bucket" { - source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3" + source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5" bucket_name = "notification-canada-ca-${var.env}-athena-logs" force_destroy = var.force_destroy_s3 @@ -365,7 +365,7 @@ module "athena_logs_bucket" { } module "cbs_logs_bucket" { - source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.0.3" + source = "github.com/cds-snc/terraform-modules//S3_log_bucket?ref=v6.1.5" count = var.create_cbs_bucket ? 1 : 0 bucket_name = var.cbs_satellite_bucket_name @@ -382,7 +382,7 @@ module "cbs_logs_bucket" { } module "sns_sms_usage_report_bucket" { - source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3" + source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4" bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs" force_destroy = var.force_destroy_s3 @@ -462,7 +462,7 @@ module "sns_sms_usage_report_bucket_us_west_2" { aws = aws.us-west-2 } - source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3" + source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4" bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs" force_destroy = var.force_destroy_s3 @@ -540,7 +540,7 @@ POLICY } module "sns_sms_usage_report_sanitized_bucket" { - source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3" + source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4" bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs-san" force_destroy = var.force_destroy_s3 @@ -557,7 +557,7 @@ module "sns_sms_usage_report_sanitized_bucket_us_west_2" { aws = aws.us-west-2 } - source = "github.com/cds-snc/terraform-modules//S3?ref=v9.2.3" + source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4" bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs-san" force_destroy = var.force_destroy_s3 diff --git a/aws/common/slack.tf b/aws/common/slack.tf index c7c409610..27d3a11d0 100644 --- a/aws/common/slack.tf +++ b/aws/common/slack.tf @@ -1,7 +1,7 @@ # Doc: https://registry.terraform.io/modules/terraform-aws-modules/notify-slack/aws/ module "notify_slack_warning" { source = "terraform-aws-modules/notify-slack/aws" - version = "6.0.0" + version = "6.4.1" create_sns_topic = false sns_topic_name = aws_sns_topic.notification-canada-ca-alert-warning.name @@ -19,7 +19,7 @@ module "notify_slack_warning" { module "notify_slack_ok" { source = "terraform-aws-modules/notify-slack/aws" - version = "6.0.0" + version = "6.4.1" create_sns_topic = false sns_topic_name = aws_sns_topic.notification-canada-ca-alert-ok.name @@ -37,7 +37,7 @@ module "notify_slack_ok" { module "notify_slack_critical" { source = "terraform-aws-modules/notify-slack/aws" - version = "6.0.0" + version = "6.4.1" create_sns_topic = false sns_topic_name = aws_sns_topic.notification-canada-ca-alert-critical.name @@ -56,7 +56,7 @@ module "notify_slack_critical" { # Shared generic slack webhook & topic. module "notify_slack_general" { source = "terraform-aws-modules/notify-slack/aws" - version = "6.0.0" + version = "6.4.1" create_sns_topic = false sns_topic_name = aws_sns_topic.notification-canada-ca-alert-general.name diff --git a/aws/eks/iam.tf b/aws/eks/iam.tf index 0186050e4..ff65a92e4 100644 --- a/aws/eks/iam.tf +++ b/aws/eks/iam.tf @@ -228,7 +228,7 @@ data "aws_iam_policy" "ssm_managed_instance" { module "iam_assumable_role_karpenter" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.28.0" + version = "5.44.0" create_role = true role_name = "karpenter-controller-eks" provider_url = data.aws_eks_cluster.notify_cluster.identity[0].oidc[0].issuer diff --git a/aws/eks/sentinel.tf b/aws/eks/sentinel.tf index 86a364021..ef0a41733 100644 --- a/aws/eks/sentinel.tf +++ b/aws/eks/sentinel.tf @@ -8,7 +8,7 @@ locals { # see https://github.com/cds-snc/terraform-modules/issues/203 # and https://docs.google.com/document/d/16LLelZ7WEKrnbocrl0Az74JqkCv5DBZ9QILRBUFJQt8/edit#heading=h.z87ipkd84djw module "sentinel_forwarder" { - source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.4.2" + source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.6.4" function_name = "sentinel-cloud-watch-forwarder" billing_tag_value = "notification-canada-ca-${var.env}" diff --git a/aws/eks/vpn.tf b/aws/eks/vpn.tf index b53981330..aa2820380 100644 --- a/aws/eks/vpn.tf +++ b/aws/eks/vpn.tf @@ -3,7 +3,7 @@ # access to the private subnets. # module "vpn" { - source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.5.3" + source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.4" endpoint_name = "private-subnets" access_group_id = var.client_vpn_access_group_id diff --git a/aws/heartbeat/lambda.tf b/aws/heartbeat/lambda.tf index dd21e2c3b..2516d0688 100644 --- a/aws/heartbeat/lambda.tf +++ b/aws/heartbeat/lambda.tf @@ -3,7 +3,7 @@ locals { } module "heartbeat" { - source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.0.4" + source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.4" name = "heartbeat" billing_tag_value = var.billing_tag_value ecr_arn = var.heartbeat_ecr_arn diff --git a/aws/pinpoint_to_sqs_sms_callbacks/lambda.tf b/aws/pinpoint_to_sqs_sms_callbacks/lambda.tf index 57bafe6fe..3d5890c2a 100644 --- a/aws/pinpoint_to_sqs_sms_callbacks/lambda.tf +++ b/aws/pinpoint_to_sqs_sms_callbacks/lambda.tf @@ -1,5 +1,5 @@ module "pinpoint_to_sqs_sms_callbacks" { - source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3" + source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3" name = "pinpoint_to_sqs_sms_callbacks" billing_tag_value = var.billing_tag_value ecr_arn = var.pinpoint_to_sqs_sms_callbacks_ecr_arn diff --git a/aws/ses_receiving_emails/lambda.tf b/aws/ses_receiving_emails/lambda.tf index e6f55729e..611f2f7e1 100644 --- a/aws/ses_receiving_emails/lambda.tf +++ b/aws/ses_receiving_emails/lambda.tf @@ -4,7 +4,7 @@ module "ses_receiving_emails" { aws = aws.us-east-1 } - source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3" + source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3" name = "ses_receiving_emails" billing_tag_value = var.billing_tag_value ecr_arn = var.ses_receiving_emails_ecr_arn diff --git a/aws/ses_to_sqs_email_callbacks/lambda.tf b/aws/ses_to_sqs_email_callbacks/lambda.tf index 9bd282b6e..793f9cc1d 100644 --- a/aws/ses_to_sqs_email_callbacks/lambda.tf +++ b/aws/ses_to_sqs_email_callbacks/lambda.tf @@ -1,5 +1,5 @@ module "ses_to_sqs_email_callbacks" { - source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3" + source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3" name = "ses_to_sqs_email_callbacks" billing_tag_value = var.billing_tag_value ecr_arn = var.ses_to_sqs_email_callbacks_ecr_arn diff --git a/aws/sns_to_sqs_sms_callbacks/lambda.tf b/aws/sns_to_sqs_sms_callbacks/lambda.tf index 67e18624e..3fd2932bc 100644 --- a/aws/sns_to_sqs_sms_callbacks/lambda.tf +++ b/aws/sns_to_sqs_sms_callbacks/lambda.tf @@ -1,5 +1,5 @@ module "sns_to_sqs_sms_callbacks" { - source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.3.3" + source = "github.com/cds-snc/terraform-modules//lambda?ref=v7.4.3" name = "sns_to_sqs_sms_callbacks" billing_tag_value = var.billing_tag_value ecr_arn = var.sns_to_sqs_sms_callbacks_ecr_arn diff --git a/aws/system_status/lambda.tf b/aws/system_status/lambda.tf index 87ae7dff5..00339b170 100644 --- a/aws/system_status/lambda.tf +++ b/aws/system_status/lambda.tf @@ -3,7 +3,7 @@ locals { } module "system_status" { - source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.0.4" + source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.4" name = "system_status" billing_tag_value = var.billing_tag_value ecr_arn = var.system_status_ecr_arn diff --git a/aws/system_status_static_site/main.tf b/aws/system_status_static_site/main.tf index af28c9383..50e3fae86 100644 --- a/aws/system_status_static_site/main.tf +++ b/aws/system_status_static_site/main.tf @@ -5,7 +5,7 @@ variable "billing_tag_value" { } module "system_status_static_site" { - source = "github.com/cds-snc/terraform-modules//simple_static_website?ref=v9.5.3" + source = "github.com/cds-snc/terraform-modules//simple_static_website?ref=v9.6.4" domain_name_source = var.env == "production" ? "status.notification.canada.ca" : "status.${var.env}.notification.cdssandbox.xyz" billing_tag_value = var.billing_tag_value diff --git a/scripts/sanitize_sms_usage_logs/requirements.txt b/scripts/sanitize_sms_usage_logs/requirements.txt index cc3df7484..7f4a022a1 100644 --- a/scripts/sanitize_sms_usage_logs/requirements.txt +++ b/scripts/sanitize_sms_usage_logs/requirements.txt @@ -1,5 +1,5 @@ -boto3==1.34.25 -fsspec==2024.5.0 +boto3==1.35.10 +fsspec==2024.6.1 pandas==2.2.2 python-dotenv==1.0.1 -s3fs==2024.5.0 +s3fs==2024.6.1 diff --git a/scripts/set_sms_keywords/requirements.txt b/scripts/set_sms_keywords/requirements.txt index 646600bf3..e07c32283 100644 --- a/scripts/set_sms_keywords/requirements.txt +++ b/scripts/set_sms_keywords/requirements.txt @@ -1,2 +1,2 @@ -boto3==1.34.25 +boto3==1.35.10 python-dotenv==1.0.1