diff --git a/examples/tfengine/generated/devops/groups/main.tf b/examples/tfengine/generated/devops/groups/main.tf index 4a5983d42..32637d909 100644 --- a/examples/tfengine/generated/devops/groups/main.tf +++ b/examples/tfengine/generated/devops/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -51,7 +51,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-editors@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/folder_foundation/audit/main.tf b/examples/tfengine/generated/folder_foundation/audit/main.tf index d32b4be40..67907b34b 100644 --- a/examples/tfengine/generated/folder_foundation/audit/main.tf +++ b/examples/tfengine/generated/folder_foundation/audit/main.tf @@ -15,7 +15,7 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.0, <= 3.71" + google = "<= 3.90" google-beta = "~>3.50" kubernetes = "~> 1.0" } @@ -70,7 +70,7 @@ resource "google_folder_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.4.0" log_sink_name = "example-bigquery-audit-logs-sink" destination_uri = module.bigquery_destination.destination_uri @@ -83,7 +83,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.3.0" + version = "~> 7.4.0" dataset_name = "1yr_folder_audit_logs" project_id = module.project.project_id @@ -94,7 +94,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.4.0" log_sink_name = "example-storage-audit-logs-sink" destination_uri = module.storage_destination.destination_uri @@ -110,7 +110,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.3.0" + version = "~> 7.4.0" storage_bucket_name = "7yr-folder-audit-logs" project_id = module.project.project_id diff --git a/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf b/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf index 6242df8c8..8e6c1a90b 100644 --- a/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf +++ b/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf @@ -51,7 +51,7 @@ module "project" { module "example_network" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "example-network" project_id = module.project.project_id @@ -69,7 +69,7 @@ module "example_network" { module "example_router" { source = "terraform-google-modules/cloud-router/google" - version = "~> 1.2.0" + version = "~> 1.3.0" name = "example-router" project = module.project.project_id diff --git a/examples/tfengine/generated/folder_foundation/groups/main.tf b/examples/tfengine/generated/folder_foundation/groups/main.tf index f64b1f88c..ad0099b97 100644 --- a/examples/tfengine/generated/folder_foundation/groups/main.tf +++ b/examples/tfengine/generated/folder_foundation/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_auditors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-auditors@example.com" customer_id = "c12345678" @@ -52,7 +52,7 @@ module "example_auditors_example_com" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -61,7 +61,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-editors@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf b/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf index c08dae72d..38a409bc2 100644 --- a/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf +++ b/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf @@ -50,7 +50,7 @@ module "project" { module "network" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "network" project_id = module.project.project_id diff --git a/examples/tfengine/generated/multi_envs/audit/main.tf b/examples/tfengine/generated/multi_envs/audit/main.tf index 9da7df33a..c7600f0fc 100644 --- a/examples/tfengine/generated/multi_envs/audit/main.tf +++ b/examples/tfengine/generated/multi_envs/audit/main.tf @@ -70,7 +70,7 @@ resource "google_folder_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.4.0" log_sink_name = "example-bigquery-audit-logs-sink" destination_uri = module.bigquery_destination.destination_uri @@ -83,7 +83,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.3.0" + version = "~> 7.4.0" dataset_name = "1yr_folder_audit_logs" project_id = module.project.project_id @@ -94,7 +94,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.4.0" log_sink_name = "example-storage-audit-logs-sink" destination_uri = module.storage_destination.destination_uri @@ -110,7 +110,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.3.0" + version = "~> 7.4.0" storage_bucket_name = "7yr-folder-audit-logs" project_id = module.project.project_id diff --git a/examples/tfengine/generated/multi_envs/devops/main.tf b/examples/tfengine/generated/multi_envs/devops/main.tf index acaf68cb6..ab44be25f 100644 --- a/examples/tfengine/generated/multi_envs/devops/main.tf +++ b/examples/tfengine/generated/multi_envs/devops/main.tf @@ -69,7 +69,7 @@ module "state_bucket" { # Devops project owners group. module "owners_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-devops-owners@example.com" customer_id = "c12345678" @@ -100,7 +100,7 @@ resource "google_project_iam_binding" "devops_owners" { # Admins group for at folder level. module "admins_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-folder-admins@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/multi_envs/groups/main.tf b/examples/tfengine/generated/multi_envs/groups/main.tf index e8b4a1ddb..5842e8bbd 100644 --- a/examples/tfengine/generated/multi_envs/groups/main.tf +++ b/examples/tfengine/generated/multi_envs/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_auditors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-auditors@example.com" customer_id = "c12345678" @@ -52,7 +52,7 @@ module "example_auditors_example_com" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -61,7 +61,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-editors@example.com" customer_id = "c12345678" @@ -70,7 +70,7 @@ module "example_cicd_editors_example_com" { module "example_source_readers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-source-readers@example.com" customer_id = "c12345678" @@ -79,7 +79,7 @@ module "example_source_readers_example_com" { module "example_source_writers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-source-writers@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/org_foundation/audit/main.tf b/examples/tfengine/generated/org_foundation/audit/main.tf index 95a34d4fd..b1c6249c0 100644 --- a/examples/tfengine/generated/org_foundation/audit/main.tf +++ b/examples/tfengine/generated/org_foundation/audit/main.tf @@ -69,7 +69,7 @@ resource "google_organization_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.4.0" log_sink_name = "bigquery-audit-logs-sink" destination_uri = module.bigquery_destination.destination_uri @@ -82,7 +82,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.3.0" + version = "~> 7.4.0" dataset_name = "1yr_org_audit_logs" project_id = module.project.project_id @@ -93,7 +93,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.4.0" log_sink_name = "storage-audit-logs-sink" destination_uri = module.storage_destination.destination_uri @@ -109,7 +109,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.3.0" + version = "~> 7.4.0" storage_bucket_name = "7yr-org-audit-logs" project_id = module.project.project_id diff --git a/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf b/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf index d1a531255..ad5166247 100644 --- a/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf +++ b/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf @@ -50,7 +50,7 @@ module "project" { module "example_network" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "example-network" project_id = module.project.project_id @@ -68,7 +68,7 @@ module "example_network" { module "example_router" { source = "terraform-google-modules/cloud-router/google" - version = "~> 1.2.0" + version = "~> 1.3.0" name = "example-router" project = module.project.project_id diff --git a/examples/tfengine/generated/org_foundation/groups/main.tf b/examples/tfengine/generated/org_foundation/groups/main.tf index f64b1f88c..ad0099b97 100644 --- a/examples/tfengine/generated/org_foundation/groups/main.tf +++ b/examples/tfengine/generated/org_foundation/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_auditors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-auditors@example.com" customer_id = "c12345678" @@ -52,7 +52,7 @@ module "example_auditors_example_com" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -61,7 +61,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-editors@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/org_foundation/org_policies/main.tf b/examples/tfengine/generated/org_foundation/org_policies/main.tf index 076955844..4e97c13e7 100644 --- a/examples/tfengine/generated/org_foundation/org_policies/main.tf +++ b/examples/tfengine/generated/org_foundation/org_policies/main.tf @@ -32,7 +32,7 @@ terraform { # App Engine module "orgpolicy_appengine_disable_code_download" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -45,7 +45,7 @@ module "orgpolicy_appengine_disable_code_download" { # Cloud SQL module "orgpolicy_sql_restrict_authorized_networks" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -57,7 +57,7 @@ module "orgpolicy_sql_restrict_authorized_networks" { module "orgpolicy_sql_restrict_public_ip" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -70,7 +70,7 @@ module "orgpolicy_sql_restrict_public_ip" { # Compute Engine module "orgpolicy_compute_disable_nested_virtualization" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -82,7 +82,7 @@ module "orgpolicy_compute_disable_nested_virtualization" { module "orgpolicy_compute_disable_serial_port_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -94,7 +94,7 @@ module "orgpolicy_compute_disable_serial_port_access" { module "orgpolicy_compute_skip_default_network_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -106,7 +106,7 @@ module "orgpolicy_compute_skip_default_network_creation" { module "orgpolicy_compute_vm_external_ip_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -119,7 +119,7 @@ module "orgpolicy_compute_vm_external_ip_access" { module "orgpolicy_compute_restrict_xpn_project_lien_removal" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -132,7 +132,7 @@ module "orgpolicy_compute_restrict_xpn_project_lien_removal" { # Cloud Identity and Access Management module "orgpolicy_iam_allowed_policy_member_domains" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -146,7 +146,7 @@ module "orgpolicy_iam_allowed_policy_member_domains" { # https://medium.com/@jryancanty/stop-downloading-google-cloud-service-account-keys-1811d44a97d9 module "orgpolicy_disable_service_account_key_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -158,7 +158,7 @@ module "orgpolicy_disable_service_account_key_creation" { module "orgpolicy_disable_service_account_key_upload" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -170,7 +170,7 @@ module "orgpolicy_disable_service_account_key_upload" { module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -183,7 +183,7 @@ module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { # Google Cloud Platform - Resource Locations module "orgpolicy_gcp_resource_locations" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -197,7 +197,7 @@ module "orgpolicy_gcp_resource_locations" { # Cloud Storage module "orgpolicy_storage_uniform_bucket_level_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" diff --git a/examples/tfengine/generated/org_policies/org_policies/main.tf b/examples/tfengine/generated/org_policies/org_policies/main.tf index 3fc90db2b..8193d3b11 100644 --- a/examples/tfengine/generated/org_policies/org_policies/main.tf +++ b/examples/tfengine/generated/org_policies/org_policies/main.tf @@ -32,7 +32,7 @@ terraform { # App Engine module "orgpolicy_appengine_disable_code_download" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -45,7 +45,7 @@ module "orgpolicy_appengine_disable_code_download" { # Cloud SQL module "orgpolicy_sql_restrict_authorized_networks" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -57,7 +57,7 @@ module "orgpolicy_sql_restrict_authorized_networks" { module "orgpolicy_sql_restrict_public_ip" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -70,7 +70,7 @@ module "orgpolicy_sql_restrict_public_ip" { # Compute Engine module "orgpolicy_compute_disable_nested_virtualization" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -82,7 +82,7 @@ module "orgpolicy_compute_disable_nested_virtualization" { module "orgpolicy_compute_disable_serial_port_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -93,7 +93,7 @@ module "orgpolicy_compute_disable_serial_port_access" { } module "orgpolicy_compute_restrict_shared_vpc_host_projects" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -106,7 +106,7 @@ module "orgpolicy_compute_restrict_shared_vpc_host_projects" { module "orgpolicy_compute_skip_default_network_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -117,7 +117,7 @@ module "orgpolicy_compute_skip_default_network_creation" { } module "orgpolicy_compute_trusted_image_projects" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -129,7 +129,7 @@ module "orgpolicy_compute_trusted_image_projects" { } module "orgpolicy_compute_vm_can_ip_forward" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -142,7 +142,7 @@ module "orgpolicy_compute_vm_can_ip_forward" { module "orgpolicy_compute_vm_external_ip_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -155,7 +155,7 @@ module "orgpolicy_compute_vm_external_ip_access" { module "orgpolicy_compute_restrict_xpn_project_lien_removal" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -168,7 +168,7 @@ module "orgpolicy_compute_restrict_xpn_project_lien_removal" { # Cloud Identity and Access Management module "orgpolicy_iam_allowed_policy_member_domains" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -182,7 +182,7 @@ module "orgpolicy_iam_allowed_policy_member_domains" { # https://medium.com/@jryancanty/stop-downloading-google-cloud-service-account-keys-1811d44a97d9 module "orgpolicy_disable_service_account_key_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -194,7 +194,7 @@ module "orgpolicy_disable_service_account_key_creation" { module "orgpolicy_disable_service_account_key_upload" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -206,7 +206,7 @@ module "orgpolicy_disable_service_account_key_upload" { module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -219,7 +219,7 @@ module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { # Google Cloud Platform - Resource Locations module "orgpolicy_gcp_resource_locations" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" @@ -233,7 +233,7 @@ module "orgpolicy_gcp_resource_locations" { # Cloud Storage module "orgpolicy_storage_uniform_bucket_level_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "organization" organization_id = "12345678" diff --git a/examples/tfengine/generated/resources_only/resources/main.tf b/examples/tfengine/generated/resources_only/resources/main.tf index ea44a4ad1..bfcf2a4b5 100644 --- a/examples/tfengine/generated/resources_only/resources/main.tf +++ b/examples/tfengine/generated/resources_only/resources/main.tf @@ -36,7 +36,7 @@ module "project" { module "one_billion_ms_example_dataset" { source = "terraform-google-modules/bigquery/google" - version = "~> 5.3.0" + version = "~> 5.4.0" dataset_id = "1billion_ms_example_dataset" project_id = module.project.project_id diff --git a/examples/tfengine/generated/team/devops/main.tf b/examples/tfengine/generated/team/devops/main.tf index ecc856e72..74b8a63d1 100644 --- a/examples/tfengine/generated/team/devops/main.tf +++ b/examples/tfengine/generated/team/devops/main.tf @@ -15,7 +15,7 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.0, <= 3.71" + google = "<= 3.90" google-beta = "~>3.50" kubernetes = "~> 1.0" } @@ -78,7 +78,7 @@ module "state_bucket" { # Devops project owners group. module "owners_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-devops-owners@example.com" customer_id = "c12345678" @@ -108,7 +108,7 @@ resource "google_project_iam_binding" "devops_owners" { # Admins group for at folder level. module "admins_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-team-admins@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/team/groups/main.tf b/examples/tfengine/generated/team/groups/main.tf index cc5729f86..765d670b9 100644 --- a/examples/tfengine/generated/team/groups/main.tf +++ b/examples/tfengine/generated/team/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -51,7 +51,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-cicd-editors@example.com" customer_id = "c12345678" @@ -60,7 +60,7 @@ module "example_cicd_editors_example_com" { module "example_apps_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-apps-viewers@example.com" customer_id = "c12345678" @@ -69,7 +69,7 @@ module "example_apps_viewers_example_com" { module "example_data_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-data-viewers@example.com" customer_id = "c12345678" @@ -78,7 +78,7 @@ module "example_data_viewers_example_com" { module "example_healthcare_dataset_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-healthcare-dataset-viewers@example.com" customer_id = "c12345678" @@ -87,7 +87,7 @@ module "example_healthcare_dataset_viewers_example_com" { module "example_fhir_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-fhir-viewers@example.com" customer_id = "c12345678" @@ -96,7 +96,7 @@ module "example_fhir_viewers_example_com" { module "example_bastion_accessors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "example-bastion-accessors@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/team/project_data/main.tf b/examples/tfengine/generated/team/project_data/main.tf index 0f2592b60..81a490f94 100644 --- a/examples/tfengine/generated/team/project_data/main.tf +++ b/examples/tfengine/generated/team/project_data/main.tf @@ -81,7 +81,7 @@ module "project" { module "one_billion_ms_dataset" { source = "terraform-google-modules/bigquery/google" - version = "~> 5.3.0" + version = "~> 5.4.0" dataset_id = "1billion_ms_dataset" project_id = module.project.project_id diff --git a/examples/tfengine/generated/team/project_networks/main.tf b/examples/tfengine/generated/team/project_networks/main.tf index 2ce2a457c..fe76582cc 100644 --- a/examples/tfengine/generated/team/project_networks/main.tf +++ b/examples/tfengine/generated/team/project_networks/main.tf @@ -91,7 +91,7 @@ EOF module "network" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "network" project_id = module.project.project_id @@ -145,7 +145,7 @@ module "cloud_sql_private_service_access_network" { module "router" { source = "terraform-google-modules/cloud-router/google" - version = "~> 1.2.0" + version = "~> 1.3.0" name = "router" project = module.project.project_id diff --git a/examples/tfengine/generated/team/project_secrets/main.tf b/examples/tfengine/generated/team/project_secrets/main.tf index 7c3005f60..560072130 100644 --- a/examples/tfengine/generated/team/project_secrets/main.tf +++ b/examples/tfengine/generated/team/project_secrets/main.tf @@ -15,7 +15,7 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.0, <= 3.71" + google = "<= 3.90" google-beta = "~>3.50" null = "~> 3.0" kubernetes = "~> 1.0" diff --git a/templates/tfengine/components/audit/main.tf b/templates/tfengine/components/audit/main.tf index 0940aa530..65705e5a3 100644 --- a/templates/tfengine/components/audit/main.tf +++ b/templates/tfengine/components/audit/main.tf @@ -42,7 +42,7 @@ resource "google_{{.parent_type}}_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.4.0" log_sink_name = "{{get .logs_bigquery_dataset "sink_name" "bigquery-audit-logs-sink"}}" destination_uri = "${module.bigquery_destination.destination_uri}" @@ -55,7 +55,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.3.0" + version = "~> 7.4.0" dataset_name = "{{.logs_bigquery_dataset.dataset_id}}" project_id = module.project.project_id @@ -66,7 +66,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.4.0" log_sink_name = "{{get .logs_storage_bucket "sink_name" "storage-audit-logs-sink"}}" destination_uri = "${module.storage_destination.destination_uri}" @@ -82,7 +82,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.3.0" + version = "~> 7.4.0" storage_bucket_name = "{{.logs_storage_bucket.name}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/devops/main.tf b/templates/tfengine/components/devops/main.tf index 20167570c..aa03193f8 100644 --- a/templates/tfengine/components/devops/main.tf +++ b/templates/tfengine/components/devops/main.tf @@ -79,7 +79,7 @@ source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" # Devops project owners group. module "owners_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "{{.project.owners_group.id}}" customer_id = "{{.project.owners_group.customer_id}}" @@ -124,7 +124,7 @@ resource "google_project_iam_binding" "devops_owners" { # Admins group for at {{.parent_type}} level. module "admins_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "{{.admins_group.id}}" customer_id = "{{.admins_group.customer_id}}" diff --git a/templates/tfengine/components/org_policies/main.tf b/templates/tfengine/components/org_policies/main.tf index 36f0da26e..5d6e302c1 100644 --- a/templates/tfengine/components/org_policies/main.tf +++ b/templates/tfengine/components/org_policies/main.tf @@ -21,7 +21,7 @@ limitations under the License. */ -}} # App Engine module "orgpolicy_appengine_disable_code_download" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -34,7 +34,7 @@ module "orgpolicy_appengine_disable_code_download" { # Cloud SQL module "orgpolicy_sql_restrict_authorized_networks" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -46,7 +46,7 @@ module "orgpolicy_sql_restrict_authorized_networks" { module "orgpolicy_sql_restrict_public_ip" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -59,7 +59,7 @@ module "orgpolicy_sql_restrict_public_ip" { # Compute Engine module "orgpolicy_compute_disable_nested_virtualization" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -71,7 +71,7 @@ module "orgpolicy_compute_disable_nested_virtualization" { module "orgpolicy_compute_disable_serial_port_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -84,7 +84,7 @@ module "orgpolicy_compute_disable_serial_port_access" { {{- if index . "allowed_shared_vpc_host_projects"}} module "orgpolicy_compute_restrict_shared_vpc_host_projects" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -98,7 +98,7 @@ module "orgpolicy_compute_restrict_shared_vpc_host_projects" { module "orgpolicy_compute_skip_default_network_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -111,7 +111,7 @@ module "orgpolicy_compute_skip_default_network_creation" { {{- if index . "allowed_trusted_image_projects"}} module "orgpolicy_compute_trusted_image_projects" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -127,7 +127,7 @@ module "orgpolicy_compute_trusted_image_projects" { {{- if index . "allowed_ip_forwarding_vms"}} module "orgpolicy_compute_vm_can_ip_forward" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -141,7 +141,7 @@ module "orgpolicy_compute_vm_can_ip_forward" { module "orgpolicy_compute_vm_external_ip_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -154,7 +154,7 @@ module "orgpolicy_compute_vm_external_ip_access" { module "orgpolicy_compute_restrict_xpn_project_lien_removal" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -167,7 +167,7 @@ module "orgpolicy_compute_restrict_xpn_project_lien_removal" { # Cloud Identity and Access Management module "orgpolicy_iam_allowed_policy_member_domains" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -181,7 +181,7 @@ module "orgpolicy_iam_allowed_policy_member_domains" { # https://medium.com/@jryancanty/stop-downloading-google-cloud-service-account-keys-1811d44a97d9 module "orgpolicy_disable_service_account_key_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -193,7 +193,7 @@ module "orgpolicy_disable_service_account_key_creation" { module "orgpolicy_disable_service_account_key_upload" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -205,7 +205,7 @@ module "orgpolicy_disable_service_account_key_upload" { module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -218,7 +218,7 @@ module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { # Google Cloud Platform - Resource Locations module "orgpolicy_gcp_resource_locations" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -232,7 +232,7 @@ module "orgpolicy_gcp_resource_locations" { # Cloud Storage module "orgpolicy_storage_uniform_bucket_level_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.1.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" diff --git a/templates/tfengine/components/resources/bigquery_datasets/main.tf b/templates/tfengine/components/resources/bigquery_datasets/main.tf index 3c2bb5d1b..d7702da0a 100644 --- a/templates/tfengine/components/resources/bigquery_datasets/main.tf +++ b/templates/tfengine/components/resources/bigquery_datasets/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range get . "bigquery_datasets"}} module "{{resourceName . "dataset_id"}}" { source = "terraform-google-modules/bigquery/google" - version = "~> 5.3.0" + version = "~> 5.4.0" dataset_id = "{{.dataset_id}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/resources/compute_networks/main.tf b/templates/tfengine/components/resources/compute_networks/main.tf index 44f3def9a..52f86a430 100644 --- a/templates/tfengine/components/resources/compute_networks/main.tf +++ b/templates/tfengine/components/resources/compute_networks/main.tf @@ -18,7 +18,7 @@ limitations under the License. */ -}} module "{{$resource_name}}" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "{{.name}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/resources/compute_routers/main.tf b/templates/tfengine/components/resources/compute_routers/main.tf index 009a8b8cf..86501480e 100644 --- a/templates/tfengine/components/resources/compute_routers/main.tf +++ b/templates/tfengine/components/resources/compute_routers/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range .compute_routers}} module "{{resourceName . "name"}}" { source = "terraform-google-modules/cloud-router/google" - version = "~> 1.2.0" + version = "~> 1.3.0" name = "{{.name}}" project = module.project.project_id diff --git a/templates/tfengine/components/resources/groups/main.tf b/templates/tfengine/components/resources/groups/main.tf index 455b270d0..d1d96048d 100644 --- a/templates/tfengine/components/resources/groups/main.tf +++ b/templates/tfengine/components/resources/groups/main.tf @@ -21,7 +21,7 @@ provider "google-beta" { {{range .groups}} module "{{resourceName . "id"}}" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.4" id = "{{.id}}" customer_id = "{{.customer_id}}"