Skip to content

Commit

Permalink
chore(deps): update all dependencies
Browse files Browse the repository at this point in the history
  • Loading branch information
renovate[bot] authored Jan 1, 2025
1 parent 84d6c38 commit 502b2a6
Show file tree
Hide file tree
Showing 14 changed files with 33 additions and 33 deletions.
10 changes: 5 additions & 5 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
repos:
- repo: https://github.com/pre-commit/pre-commit-hooks
rev: v4.6.0
rev: v5.0.0
hooks:
- id: check-added-large-files
args: ["--maxkb=1024"]
Expand All @@ -17,7 +17,7 @@ repos:
args:
- "--allow-multiple-documents"
- repo: https://github.com/sirosen/texthooks
rev: 0.6.6
rev: 0.6.8
hooks:
- id: fix-smartquotes
- repo: https://github.com/tekwizely/pre-commit-golang
Expand All @@ -30,7 +30,7 @@ repos:
- "--verbose"
- "--allow-parallel-runners"
- repo: https://github.com/antonbabenko/pre-commit-terraform
rev: v1.91.0
rev: v1.96.3
hooks:
- id: terraform_fmt
args:
Expand All @@ -51,7 +51,7 @@ repos:
- --args=--config=__GIT_WORKING_DIR__/.tflint.hcl
- --hook-config=--tf-path=tofu
- repo: https://github.com/tofuutils/pre-commit-opentofu
rev: v1.0.3 # Get the latest from: https://github.com/tofuutils/pre-commit-opentofu/releases
rev: v2.1.0 # Get the latest from: https://github.com/tofuutils/pre-commit-opentofu/releases
hooks:
- id: tofu_docs
args:
Expand All @@ -60,6 +60,6 @@ repos:
- --hook-config=--add-to-existing-file=true # Boolean. true or false
- --hook-config=--create-file-if-not-exist=true # Boolean. true or false
- repo: https://github.com/renovatebot/pre-commit-hooks
rev: 37.412.1
rev: 39.86.3
hooks:
- id: renovate-config-validator
6 changes: 3 additions & 3 deletions iac/swf/artifactory.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ locals {
}

module "artifactory_kms_key" {
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.3"
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.6"

kms_key_alias_name_prefix = local.artifactory_kms_key_alias_name_prefix
kms_key_deletion_window = 7
Expand All @@ -15,7 +15,7 @@ module "artifactory_kms_key" {
module "artifactory_s3_bucket" {
for_each = toset(var.artifactory_bucket_names)

source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.1.2"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.3.0"

bucket = join("-", compact([local.prefix, each.key, local.suffix]))
force_destroy = var.artifactory_s3_bucket_force_destroy
Expand Down Expand Up @@ -129,7 +129,7 @@ resource "aws_secretsmanager_secret" "artifactory_db_secret" {

module "artifactory_db" {
source = "terraform-aws-modules/rds/aws"
version = "6.7.0"
version = "6.10.0"
tags = local.tags

identifier = var.artifactory_db_idenitfier_prefix
Expand Down
4 changes: 2 additions & 2 deletions iac/swf/confluence.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ locals {
}

module "confluence_kms_key" {
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.3"
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.6"

kms_key_alias_name_prefix = local.confluence_kms_key_alias_name_prefix
kms_key_deletion_window = 7
Expand All @@ -27,7 +27,7 @@ resource "aws_secretsmanager_secret" "confluence_db_secret" {

module "confluence_db" {
source = "terraform-aws-modules/rds/aws"
version = "6.7.0"
version = "6.10.0"
tags = local.tags

identifier = var.confluence_db_idenitfier_prefix
Expand Down
4 changes: 2 additions & 2 deletions iac/swf/eks.tf
Original file line number Diff line number Diff line change
Expand Up @@ -370,7 +370,7 @@ locals {
}

module "eks" {
source = "git::https://github.com/defenseunicorns/terraform-aws-eks.git?ref=v0.0.22"
source = "git::https://github.com/defenseunicorns/terraform-aws-eks.git?ref=v0.0.25"

name = local.cluster_name
aws_region = var.region
Expand Down Expand Up @@ -556,7 +556,7 @@ module "self_managed_node_group_keypair" {
}

module "self_managed_node_group_secret_key_secrets_manager_secret" {
source = "git::https://github.com/terraform-aws-modules/terraform-aws-secrets-manager.git?ref=v1.1.2"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-secrets-manager.git?ref=v1.3.1"

name = module.self_managed_node_group_keypair.key_pair_name
description = "Secret key for the uds-swf self managed node group keypair"
Expand Down
6 changes: 3 additions & 3 deletions iac/swf/gitlab.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ locals {
module "gitlab_s3_bucket" {
for_each = toset(var.gitlab_bucket_names)

source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.1.2"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.3.0"

bucket = join("-", compact([local.prefix, each.key, local.suffix]))
tags = local.tags
Expand Down Expand Up @@ -52,7 +52,7 @@ resource "aws_s3_bucket_lifecycle_configuration" "gitlab_s3_bucket" {
}

module "gitlab_kms_key" {
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.3"
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.6"

kms_key_alias_name_prefix = local.gitlab_kms_key_alias_name_prefix
kms_key_deletion_window = 7
Expand Down Expand Up @@ -262,7 +262,7 @@ resource "aws_secretsmanager_secret" "gitlab_db_secret" {

module "gitlab_db" {
source = "terraform-aws-modules/rds/aws"
version = "6.7.0"
version = "6.10.0"
tags = local.tags

identifier = var.gitlab_db_idenitfier_prefix
Expand Down
4 changes: 2 additions & 2 deletions iac/swf/jira.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ locals {
}

module "jira_kms_key" {
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.3"
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.6"

kms_key_alias_name_prefix = local.jira_kms_key_alias_name_prefix
kms_key_deletion_window = 7
Expand All @@ -27,7 +27,7 @@ resource "aws_secretsmanager_secret" "jira_db_secret" {

module "jira_db" {
source = "terraform-aws-modules/rds/aws"
version = "6.7.0"
version = "6.10.0"
tags = local.tags

identifier = var.jira_db_idenitfier_prefix
Expand Down
4 changes: 2 additions & 2 deletions iac/swf/keycloak.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ locals {
}

module "keycloak_kms_key" {
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.3"
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.6"

kms_key_alias_name_prefix = local.keycloak_kms_key_alias_name_prefix
kms_key_deletion_window = 7
Expand All @@ -27,7 +27,7 @@ resource "aws_secretsmanager_secret" "keycloak_db_secret" {

module "keycloak_db" {
source = "terraform-aws-modules/rds/aws"
version = "6.7.0"
version = "6.10.0"
tags = local.tags

identifier = var.keycloak_db_idenitfier_prefix
Expand Down
4 changes: 2 additions & 2 deletions iac/swf/loki.tf
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ locals {
module "loki_s3_bucket" {
for_each = toset(var.loki_bucket_names)

source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.1.2"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.3.0"

bucket = join("-", compact([local.prefix, each.key, local.suffix]))
tags = local.tags
Expand Down Expand Up @@ -51,7 +51,7 @@ resource "aws_s3_bucket_lifecycle_configuration" "loki_s3_bucket" {
}

module "loki_kms_key" {
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.3"
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.6"

kms_key_alias_name_prefix = local.loki_kms_key_alias_name_prefix
kms_key_deletion_window = 7
Expand Down
6 changes: 3 additions & 3 deletions iac/swf/mattermost.tf
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ locals {
module "mattermost_s3_bucket" {
for_each = toset(var.mattermost_bucket_names)

source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.1.2"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.3.0"

bucket = join("-", compact([local.prefix, each.key, local.suffix]))
force_destroy = var.mattermost_s3_bucket_force_destroy
Expand Down Expand Up @@ -51,7 +51,7 @@ resource "aws_s3_bucket_lifecycle_configuration" "mattermost_s3_bucket" {
}

module "mattermost_kms_key" {
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.3"
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.6"

kms_key_alias_name_prefix = local.mattermost_kms_key_alias_name_prefix
kms_key_deletion_window = 7
Expand Down Expand Up @@ -88,7 +88,7 @@ resource "aws_secretsmanager_secret" "mattermost_db_secret" {

module "mattermost_db" {
source = "terraform-aws-modules/rds/aws"
version = "6.7.0"
version = "6.10.0"
tags = local.tags

identifier = var.mattermost_db_idenitfier_prefix
Expand Down
2 changes: 1 addition & 1 deletion iac/swf/modules/irsa-s3/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ resource "aws_iam_policy" "s3_bucket_policy" {
module "irsa_role" {
for_each = toset(var.serviceaccount_names)

source = "git::https://github.com/terraform-aws-modules/terraform-aws-iam.git//modules/iam-role-for-service-accounts-eks?ref=v5.39.1"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-iam.git//modules/iam-role-for-service-accounts-eks?ref=v5.52.0"

role_name = join("-", compact([var.prefix, each.value, "s3-role", var.suffix]))

Expand Down
6 changes: 3 additions & 3 deletions iac/swf/modules/zarf/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ data "aws_iam_policy_document" "s3_bucket" {


module "s3_bucket" {
source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.1.2"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.3.0"

create_bucket = var.create_s3_bucket

Expand Down Expand Up @@ -149,7 +149,7 @@ locals {
module "zarf_irsa_policy" {
count = var.create_irsa_role ? 1 : 0

source = "git::https://github.com/terraform-aws-modules/terraform-aws-iam.git//modules/iam-policy?ref=v5.39.1"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-iam.git//modules/iam-policy?ref=v5.52.0"

name = local.zarf_irsa_policy_name
path = "/"
Expand Down Expand Up @@ -185,7 +185,7 @@ module "zarf_irsa_policy" {
module "zarf_irsa_role" {
count = var.create_irsa_role ? 1 : 0

source = "git::https://github.com/terraform-aws-modules/terraform-aws-iam.git//modules/iam-role-for-service-accounts-eks?ref=v5.39.1"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-iam.git//modules/iam-role-for-service-accounts-eks?ref=v5.52.0"

role_name = local.zarf_irsa_role_name

Expand Down
4 changes: 2 additions & 2 deletions iac/swf/velero.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ locals {
module "velero_s3_bucket" {
for_each = toset(var.velero_bucket_names)

source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.1.2"
source = "git::https://github.com/terraform-aws-modules/terraform-aws-s3-bucket.git?ref=v4.3.0"

bucket = join("-", compact([local.prefix, each.key, local.suffix]))
force_destroy = var.velero_s3_bucket_force_destroy
Expand Down Expand Up @@ -50,7 +50,7 @@ resource "aws_s3_bucket_lifecycle_configuration" "velero_s3_bucket" {
}

module "velero_kms_key" {
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.3"
source = "github.com/defenseunicorns/terraform-aws-uds-kms?ref=v0.0.6"
kms_key_alias_name_prefix = local.velero_kms_key_alias_name_prefix
kms_key_deletion_window = 7
kms_key_description = "Velero Key"
Expand Down
2 changes: 1 addition & 1 deletion iac/swf/vpc.tf
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ module "subnet_addrs" {
}

module "vpc" {
source = "git::https://github.com/defenseunicorns/terraform-aws-vpc.git?ref=v0.1.11"
source = "git::https://github.com/defenseunicorns/terraform-aws-vpc.git?ref=v0.1.12"

name = local.vpc_name
vpc_cidr = var.vpc_cidr
Expand Down
4 changes: 2 additions & 2 deletions iac/transit-gateway/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ locals {
####################################################################################################

module "transit_gateway" {
source = "git::https://github.com/defenseunicorns/terraform-aws-transit-gateway.git?ref=v0.0.3"
source = "git::https://github.com/defenseunicorns/terraform-aws-transit-gateway.git?ref=v0.0.4"

create_transit_gateway = true
create_transit_gateway_route_table = false
Expand Down Expand Up @@ -93,7 +93,7 @@ locals {
# dat

module "transit_gateway_attachment" {
source = "git::https://github.com/defenseunicorns/terraform-aws-transit-gateway.git?ref=v0.0.3"
source = "git::https://github.com/defenseunicorns/terraform-aws-transit-gateway.git?ref=v0.0.4"

create_transit_gateway = false
use_existing_transit_gateway = true
Expand Down

0 comments on commit 502b2a6

Please sign in to comment.