diff --git a/aws/common/budget.tf b/aws/common/budget.tf index 9373c7a27..75757b8b7 100644 --- a/aws/common/budget.tf +++ b/aws/common/budget.tf @@ -24,7 +24,7 @@ resource "aws_budgets_budget" "notify_global" { } module "budget_notifier" { - source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//spend_notifier?ref=v9.6.5" daily_spend_notifier_hook = var.budget_sre_bot_webhook weekly_spend_notifier_hook = var.budget_sre_bot_webhook billing_tag_value = "notification-canada-ca-${var.env}" diff --git a/aws/common/s3.tf b/aws/common/s3.tf index 7323c1201..dcf189757 100644 --- a/aws/common/s3.tf +++ b/aws/common/s3.tf @@ -386,7 +386,7 @@ module "cbs_logs_bucket" { } module "sns_sms_usage_report_bucket" { - source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.5" bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs" force_destroy = var.force_destroy_s3 @@ -466,7 +466,7 @@ module "sns_sms_usage_report_bucket_us_west_2" { aws = aws.us-west-2 } - source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.5" bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs" force_destroy = var.force_destroy_s3 @@ -544,7 +544,7 @@ POLICY } module "sns_sms_usage_report_sanitized_bucket" { - source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.5" bucket_name = "notification-canada-ca-${var.env}-sms-usage-logs-san" force_destroy = var.force_destroy_s3 @@ -561,7 +561,7 @@ module "sns_sms_usage_report_sanitized_bucket_us_west_2" { aws = aws.us-west-2 } - source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//S3?ref=v9.6.5" bucket_name = "notification-canada-ca-${var.env}-sms-usage-west-2-logs-san" force_destroy = var.force_destroy_s3 diff --git a/aws/eks/sentinel.tf b/aws/eks/sentinel.tf index ef0a41733..f8ac1217a 100644 --- a/aws/eks/sentinel.tf +++ b/aws/eks/sentinel.tf @@ -8,7 +8,7 @@ locals { # see https://github.com/cds-snc/terraform-modules/issues/203 # and https://docs.google.com/document/d/16LLelZ7WEKrnbocrl0Az74JqkCv5DBZ9QILRBUFJQt8/edit#heading=h.z87ipkd84djw module "sentinel_forwarder" { - source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//sentinel_forwarder?ref=v9.6.5" function_name = "sentinel-cloud-watch-forwarder" billing_tag_value = "notification-canada-ca-${var.env}" diff --git a/aws/eks/vpn.tf b/aws/eks/vpn.tf index aa2820380..e441ee3a2 100644 --- a/aws/eks/vpn.tf +++ b/aws/eks/vpn.tf @@ -3,7 +3,7 @@ # access to the private subnets. # module "vpn" { - source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.5" endpoint_name = "private-subnets" access_group_id = var.client_vpn_access_group_id @@ -29,7 +29,7 @@ module "vpn" { # GHA VPN module "gha_vpn" { - source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//client_vpn?ref=v9.6.5" endpoint_name = "gha-vpn" access_group_id = var.client_vpn_access_group_id diff --git a/aws/heartbeat/lambda.tf b/aws/heartbeat/lambda.tf index 2516d0688..677bec15a 100644 --- a/aws/heartbeat/lambda.tf +++ b/aws/heartbeat/lambda.tf @@ -3,7 +3,7 @@ locals { } module "heartbeat" { - source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.5" name = "heartbeat" billing_tag_value = var.billing_tag_value ecr_arn = var.heartbeat_ecr_arn diff --git a/aws/system_status/lambda.tf b/aws/system_status/lambda.tf index 00339b170..660d1cf9b 100644 --- a/aws/system_status/lambda.tf +++ b/aws/system_status/lambda.tf @@ -3,7 +3,7 @@ locals { } module "system_status" { - source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//lambda?ref=v9.6.5" name = "system_status" billing_tag_value = var.billing_tag_value ecr_arn = var.system_status_ecr_arn diff --git a/aws/system_status_static_site/main.tf b/aws/system_status_static_site/main.tf index 60aa8b8bf..d2495c5f3 100644 --- a/aws/system_status_static_site/main.tf +++ b/aws/system_status_static_site/main.tf @@ -5,7 +5,7 @@ variable "billing_tag_value" { } module "system_status_static_site" { - source = "github.com/cds-snc/terraform-modules//simple_static_website?ref=v9.6.4" + source = "github.com/cds-snc/terraform-modules//simple_static_website?ref=v9.6.5" domain_name_source = var.env == "production" ? "status.notification.canada.ca" : "status.${var.env}.notification.cdssandbox.xyz" billing_tag_value = var.billing_tag_value diff --git a/scripts/sanitize_sms_usage_logs/requirements.txt b/scripts/sanitize_sms_usage_logs/requirements.txt index e483c9e3e..b782b2456 100644 --- a/scripts/sanitize_sms_usage_logs/requirements.txt +++ b/scripts/sanitize_sms_usage_logs/requirements.txt @@ -1,4 +1,4 @@ -boto3==1.35.12 +boto3==1.35.19 fsspec==2024.9.0 pandas==2.2.2 python-dotenv==1.0.1 diff --git a/scripts/set_sms_keywords/requirements.txt b/scripts/set_sms_keywords/requirements.txt index a81d4dce8..123ed59ac 100644 --- a/scripts/set_sms_keywords/requirements.txt +++ b/scripts/set_sms_keywords/requirements.txt @@ -1,2 +1,2 @@ -boto3==1.35.12 +boto3==1.35.19 python-dotenv==1.0.1