Skip to content

Commit

Permalink
chore(deps): update all patch dependencies
Browse files Browse the repository at this point in the history
  • Loading branch information
renovate[bot] authored Sep 26, 2024
1 parent 74166db commit c0ad6da
Show file tree
Hide file tree
Showing 9 changed files with 13 additions and 13 deletions.
2 changes: 1 addition & 1 deletion aws/common/budget.tf
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ resource "aws_budgets_budget" "notify_global" {
}

module "budget_notifier" {
source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.6.6"
daily_spend_notifier_hook = var.budget_sre_bot_webhook
weekly_spend_notifier_hook = var.budget_sre_bot_webhook
billing_tag_value = "notification-canada-ca-${var.env}"
Expand Down
8 changes: 4 additions & 4 deletions aws/common/s3.tf
Original file line number Diff line number Diff line change
Expand Up @@ -386,7 +386,7 @@ module "cbs_logs_bucket" {
}

module "sns_sms_usage_report_bucket" {
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.6"

bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs"
force_destroy = var.force_destroy_s3
Expand Down Expand Up @@ -466,7 +466,7 @@ module "sns_sms_usage_report_bucket_us_west_2" {
aws = aws.us-west-2
}

source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.6"

bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs"
force_destroy = var.force_destroy_s3
Expand Down Expand Up @@ -544,7 +544,7 @@ POLICY
}

module "sns_sms_usage_report_sanitized_bucket" {
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.6"

bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs-san"
force_destroy = var.force_destroy_s3
Expand All @@ -561,7 +561,7 @@ module "sns_sms_usage_report_sanitized_bucket_us_west_2" {
aws = aws.us-west-2
}

source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.6"

bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs-san"
force_destroy = var.force_destroy_s3
Expand Down
2 changes: 1 addition & 1 deletion aws/eks/sentinel.tf
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ locals {
# see https://github.com/cds-snc/terraform-modules/issues/203
# and https://docs.google.com/document/d/16LLelZ7WEKrnbocrl0Az74JqkCv5DBZ9QILRBUFJQt8/edit#heading=h.z87ipkd84djw
module "sentinel_forwarder" {
source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.6.6"
function_name = "sentinel-cloud-watch-forwarder"
billing_tag_value = "notification-canada-ca-${var.env}"

Expand Down
4 changes: 2 additions & 2 deletions aws/eks/vpn.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
# access to the private subnets.
#
module "vpn" {
source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.6"

endpoint_name = "private-subnets"
access_group_id = var.client_vpn_access_group_id
Expand All @@ -29,7 +29,7 @@ module "vpn" {

# GHA VPN
module "gha_vpn" {
source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.6"

endpoint_name = "gha-vpn"
access_group_id = var.client_vpn_access_group_id
Expand Down
2 changes: 1 addition & 1 deletion aws/heartbeat/lambda.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ locals {
}

module "heartbeat" {
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.6"
name = "heartbeat"
billing_tag_value = var.billing_tag_value
ecr_arn = var.heartbeat_ecr_arn
Expand Down
2 changes: 1 addition & 1 deletion aws/system_status/lambda.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ locals {
}

module "system_status" {
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.6"
name = "system_status"
billing_tag_value = var.billing_tag_value
ecr_arn = var.system_status_ecr_arn
Expand Down
2 changes: 1 addition & 1 deletion aws/system_status_static_site/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ variable "billing_tag_value" {
}

module "system_status_static_site" {
source = "github.com/cds-snc/terraform-modules//simple_static_website?ref=v9.6.4"
source = "github.com/cds-snc/terraform-modules//simple_static_website?ref=v9.6.6"

domain_name_source = var.env == "production" ? "status.notification.canada.ca" : "status.${var.env}.notification.cdssandbox.xyz"
billing_tag_value = var.billing_tag_value
Expand Down
2 changes: 1 addition & 1 deletion scripts/sanitize_sms_usage_logs/requirements.txt
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
boto3==1.35.12
boto3==1.35.23
fsspec==2024.9.0
pandas==2.2.2
python-dotenv==1.0.1
Expand Down
2 changes: 1 addition & 1 deletion scripts/set_sms_keywords/requirements.txt
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
boto3==1.35.12
boto3==1.35.23
python-dotenv==1.0.1

0 comments on commit c0ad6da

Please sign in to comment.