From cc112f79df86fa76fd38d1156c48f30bf11287cf Mon Sep 17 00:00:00 2001 From: Mend Renovate Date: Thu, 26 Sep 2024 02:14:07 +0000 Subject: [PATCH] Update terraform --- .../tfengine/generated/devops/groups/main.tf | 4 +-- .../generated/folder_foundation/audit/main.tf | 10 +++--- .../example-prod-networks/main.tf | 4 +-- .../folder_foundation/groups/main.tf | 6 ++-- .../gke_cluster/kubernetes/main.tf | 2 +- .../gke_cluster/gke_cluster/networks/main.tf | 2 +- .../generated/iam_members/iam_members/main.tf | 10 +++--- .../generated/multi_envs/audit/main.tf | 8 ++--- .../generated/multi_envs/devops/main.tf | 4 +-- .../generated/multi_envs/groups/main.tf | 10 +++--- .../generated/org_foundation/audit/main.tf | 8 ++--- .../example-prod-networks/main.tf | 4 +-- .../generated/org_foundation/groups/main.tf | 6 ++-- .../org_foundation/org_policies/main.tf | 28 +++++++-------- .../org_policies/org_policies/main.tf | 34 +++++++++---------- .../resources_only/resources/main.tf | 2 +- .../team/additional_iam_members/main.tf | 10 +++--- .../tfengine/generated/team/devops/main.tf | 6 ++-- .../tfengine/generated/team/groups/main.tf | 14 ++++---- .../generated/team/kubernetes/main.tf | 2 +- .../generated/team/project_apps/main.tf | 2 +- .../generated/team/project_data/main.tf | 4 +-- .../generated/team/project_networks/main.tf | 4 +-- .../generated/team/project_secrets/main.tf | 2 +- templates/tfengine/components/audit/main.tf | 8 ++--- templates/tfengine/components/devops/main.tf | 4 +-- .../tfengine/components/iam_members/main.tf | 10 +++--- .../tfengine/components/org_policies/main.tf | 34 +++++++++---------- .../resources/bigquery_datasets/main.tf | 2 +- .../resources/compute_networks/main.tf | 2 +- .../resources/compute_routers/main.tf | 2 +- .../components/resources/groups/main.tf | 2 +- .../resources/project_iam_members/main.tf | 2 +- .../resources/workload_identity/main.tf | 2 +- 34 files changed, 127 insertions(+), 127 deletions(-) diff --git a/examples/tfengine/generated/devops/groups/main.tf b/examples/tfengine/generated/devops/groups/main.tf index 72e7c678c..77e0ac49f 100644 --- a/examples/tfengine/generated/devops/groups/main.tf +++ b/examples/tfengine/generated/devops/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -51,7 +51,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-editors@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/folder_foundation/audit/main.tf b/examples/tfengine/generated/folder_foundation/audit/main.tf index 6f9afcbca..0f7bf3c39 100644 --- a/examples/tfengine/generated/folder_foundation/audit/main.tf +++ b/examples/tfengine/generated/folder_foundation/audit/main.tf @@ -15,7 +15,7 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.0, <= 3.71" + google = "<= 3.90" google-beta = "~>3.50" kubernetes = "~> 2.10" } @@ -70,7 +70,7 @@ resource "google_folder_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.8.0" log_sink_name = "example-bigquery-audit-logs-sink" destination_uri = module.bigquery_destination.destination_uri @@ -83,7 +83,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.3.0" + version = "~> 7.8.0" dataset_name = "1yr_folder_audit_logs" project_id = module.project.project_id @@ -94,7 +94,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.8.0" log_sink_name = "example-storage-audit-logs-sink" destination_uri = module.storage_destination.destination_uri @@ -110,7 +110,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.3.0" + version = "~> 7.8.0" storage_bucket_name = "7yr-folder-audit-logs" project_id = module.project.project_id diff --git a/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf b/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf index 7888d0b58..c2d539586 100644 --- a/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf +++ b/examples/tfengine/generated/folder_foundation/example-prod-networks/main.tf @@ -51,7 +51,7 @@ module "project" { module "example_network" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "example-network" project_id = module.project.project_id @@ -69,7 +69,7 @@ module "example_network" { module "example_router" { source = "terraform-google-modules/cloud-router/google" - version = "~> 1.2.0" + version = "~> 1.3.0" name = "example-router" project = module.project.project_id diff --git a/examples/tfengine/generated/folder_foundation/groups/main.tf b/examples/tfengine/generated/folder_foundation/groups/main.tf index 7bd9efc9f..84f263f5b 100644 --- a/examples/tfengine/generated/folder_foundation/groups/main.tf +++ b/examples/tfengine/generated/folder_foundation/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_auditors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-auditors@example.com" customer_id = "c12345678" @@ -52,7 +52,7 @@ module "example_auditors_example_com" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -61,7 +61,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-editors@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/gke_cluster/gke_cluster/kubernetes/main.tf b/examples/tfengine/generated/gke_cluster/gke_cluster/kubernetes/main.tf index ecff2cb8f..2e47e314c 100644 --- a/examples/tfengine/generated/gke_cluster/gke_cluster/kubernetes/main.tf +++ b/examples/tfengine/generated/gke_cluster/gke_cluster/kubernetes/main.tf @@ -71,7 +71,7 @@ resource "kubernetes_namespace" "example_namespace" { module "workload_identity_example_namespace" { source = "terraform-google-modules/kubernetes-engine/google//modules/workload-identity" - version = "16.1.0" + version = "16.1.1" project_id = module.project.project_id name = "example-sa" diff --git a/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf b/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf index 0b13b3f8b..907c5fe14 100644 --- a/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf +++ b/examples/tfengine/generated/gke_cluster/gke_cluster/networks/main.tf @@ -50,7 +50,7 @@ module "project" { module "network" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "network" project_id = module.project.project_id diff --git a/examples/tfengine/generated/iam_members/iam_members/main.tf b/examples/tfengine/generated/iam_members/iam_members/main.tf index b664ee8dd..86c367acf 100644 --- a/examples/tfengine/generated/iam_members/iam_members/main.tf +++ b/examples/tfengine/generated/iam_members/iam_members/main.tf @@ -27,7 +27,7 @@ terraform { module "storage_bucket_iam_members" { source = "terraform-google-modules/iam/google//modules/storage_buckets_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.storage_bucket_iam_members : @@ -39,7 +39,7 @@ module "storage_bucket_iam_members" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.project_iam_members : @@ -51,7 +51,7 @@ module "project_iam_members" { module "folder_iam_members" { source = "terraform-google-modules/iam/google//modules/folders_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.folder_iam_members : @@ -63,7 +63,7 @@ module "folder_iam_members" { module "organization_iam_members" { source = "terraform-google-modules/iam/google//modules/organizations_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.organization_iam_members : @@ -75,7 +75,7 @@ module "organization_iam_members" { module "service_account_iam_members" { source = "terraform-google-modules/iam/google//modules/service_accounts_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.service_account_iam_members : diff --git a/examples/tfengine/generated/multi_envs/audit/main.tf b/examples/tfengine/generated/multi_envs/audit/main.tf index ad530f08c..236efe19c 100644 --- a/examples/tfengine/generated/multi_envs/audit/main.tf +++ b/examples/tfengine/generated/multi_envs/audit/main.tf @@ -70,7 +70,7 @@ resource "google_folder_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.8.0" log_sink_name = "example-bigquery-audit-logs-sink" destination_uri = module.bigquery_destination.destination_uri @@ -83,7 +83,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.3.0" + version = "~> 7.8.0" dataset_name = "1yr_folder_audit_logs" project_id = module.project.project_id @@ -94,7 +94,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.8.0" log_sink_name = "example-storage-audit-logs-sink" destination_uri = module.storage_destination.destination_uri @@ -110,7 +110,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.3.0" + version = "~> 7.8.0" storage_bucket_name = "7yr-folder-audit-logs" project_id = module.project.project_id diff --git a/examples/tfengine/generated/multi_envs/devops/main.tf b/examples/tfengine/generated/multi_envs/devops/main.tf index afca5d3c9..bb76b194b 100644 --- a/examples/tfengine/generated/multi_envs/devops/main.tf +++ b/examples/tfengine/generated/multi_envs/devops/main.tf @@ -69,7 +69,7 @@ module "state_bucket" { # Devops project owners group. module "owners_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-devops-owners@example.com" customer_id = "c12345678" @@ -100,7 +100,7 @@ resource "google_project_iam_binding" "devops_owners" { # Admins group for at folder level. module "admins_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-folder-admins@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/multi_envs/groups/main.tf b/examples/tfengine/generated/multi_envs/groups/main.tf index e20efbbf6..46879439d 100644 --- a/examples/tfengine/generated/multi_envs/groups/main.tf +++ b/examples/tfengine/generated/multi_envs/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_auditors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-auditors@example.com" customer_id = "c12345678" @@ -52,7 +52,7 @@ module "example_auditors_example_com" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -61,7 +61,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-editors@example.com" customer_id = "c12345678" @@ -70,7 +70,7 @@ module "example_cicd_editors_example_com" { module "example_source_readers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-source-readers@example.com" customer_id = "c12345678" @@ -79,7 +79,7 @@ module "example_source_readers_example_com" { module "example_source_writers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-source-writers@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/org_foundation/audit/main.tf b/examples/tfengine/generated/org_foundation/audit/main.tf index 9be4e6ff1..d7a36f9da 100644 --- a/examples/tfengine/generated/org_foundation/audit/main.tf +++ b/examples/tfengine/generated/org_foundation/audit/main.tf @@ -69,7 +69,7 @@ resource "google_organization_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.8.0" log_sink_name = "bigquery-audit-logs-sink" destination_uri = module.bigquery_destination.destination_uri @@ -82,7 +82,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.3.0" + version = "~> 7.8.0" dataset_name = "1yr_org_audit_logs" project_id = module.project.project_id @@ -93,7 +93,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.8.0" log_sink_name = "storage-audit-logs-sink" destination_uri = module.storage_destination.destination_uri @@ -109,7 +109,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.3.0" + version = "~> 7.8.0" storage_bucket_name = "7yr-org-audit-logs" project_id = module.project.project_id diff --git a/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf b/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf index 3dc7c56c8..370833142 100644 --- a/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf +++ b/examples/tfengine/generated/org_foundation/example-prod-networks/main.tf @@ -50,7 +50,7 @@ module "project" { module "example_network" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "example-network" project_id = module.project.project_id @@ -68,7 +68,7 @@ module "example_network" { module "example_router" { source = "terraform-google-modules/cloud-router/google" - version = "~> 1.2.0" + version = "~> 1.3.0" name = "example-router" project = module.project.project_id diff --git a/examples/tfengine/generated/org_foundation/groups/main.tf b/examples/tfengine/generated/org_foundation/groups/main.tf index 7bd9efc9f..84f263f5b 100644 --- a/examples/tfengine/generated/org_foundation/groups/main.tf +++ b/examples/tfengine/generated/org_foundation/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_auditors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-auditors@example.com" customer_id = "c12345678" @@ -52,7 +52,7 @@ module "example_auditors_example_com" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -61,7 +61,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-editors@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/org_foundation/org_policies/main.tf b/examples/tfengine/generated/org_foundation/org_policies/main.tf index 3fcd224bf..c87e69b97 100644 --- a/examples/tfengine/generated/org_foundation/org_policies/main.tf +++ b/examples/tfengine/generated/org_foundation/org_policies/main.tf @@ -32,7 +32,7 @@ terraform { # App Engine module "orgpolicy_appengine_disable_code_download" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -45,7 +45,7 @@ module "orgpolicy_appengine_disable_code_download" { # Cloud SQL module "orgpolicy_sql_restrict_authorized_networks" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -57,7 +57,7 @@ module "orgpolicy_sql_restrict_authorized_networks" { module "orgpolicy_sql_restrict_public_ip" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -70,7 +70,7 @@ module "orgpolicy_sql_restrict_public_ip" { # Compute Engine module "orgpolicy_compute_disable_nested_virtualization" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -82,7 +82,7 @@ module "orgpolicy_compute_disable_nested_virtualization" { module "orgpolicy_compute_disable_serial_port_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -94,7 +94,7 @@ module "orgpolicy_compute_disable_serial_port_access" { module "orgpolicy_compute_skip_default_network_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -106,7 +106,7 @@ module "orgpolicy_compute_skip_default_network_creation" { module "orgpolicy_compute_vm_external_ip_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -119,7 +119,7 @@ module "orgpolicy_compute_vm_external_ip_access" { module "orgpolicy_compute_restrict_xpn_project_lien_removal" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -132,7 +132,7 @@ module "orgpolicy_compute_restrict_xpn_project_lien_removal" { # Cloud Identity and Access Management module "orgpolicy_iam_allowed_policy_member_domains" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -146,7 +146,7 @@ module "orgpolicy_iam_allowed_policy_member_domains" { # https://medium.com/@jryancanty/stop-downloading-google-cloud-service-account-keys-1811d44a97d9 module "orgpolicy_disable_service_account_key_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -158,7 +158,7 @@ module "orgpolicy_disable_service_account_key_creation" { module "orgpolicy_disable_service_account_key_upload" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -170,7 +170,7 @@ module "orgpolicy_disable_service_account_key_upload" { module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -183,7 +183,7 @@ module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { # Google Cloud Platform - Resource Locations module "orgpolicy_gcp_resource_locations" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -197,7 +197,7 @@ module "orgpolicy_gcp_resource_locations" { # Cloud Storage module "orgpolicy_storage_uniform_bucket_level_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" diff --git a/examples/tfengine/generated/org_policies/org_policies/main.tf b/examples/tfengine/generated/org_policies/org_policies/main.tf index 4f84d52d3..6b9be7c88 100644 --- a/examples/tfengine/generated/org_policies/org_policies/main.tf +++ b/examples/tfengine/generated/org_policies/org_policies/main.tf @@ -32,7 +32,7 @@ terraform { # App Engine module "orgpolicy_appengine_disable_code_download" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -45,7 +45,7 @@ module "orgpolicy_appengine_disable_code_download" { # Cloud SQL module "orgpolicy_sql_restrict_authorized_networks" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -57,7 +57,7 @@ module "orgpolicy_sql_restrict_authorized_networks" { module "orgpolicy_sql_restrict_public_ip" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -70,7 +70,7 @@ module "orgpolicy_sql_restrict_public_ip" { # Compute Engine module "orgpolicy_compute_disable_nested_virtualization" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -82,7 +82,7 @@ module "orgpolicy_compute_disable_nested_virtualization" { module "orgpolicy_compute_disable_serial_port_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -93,7 +93,7 @@ module "orgpolicy_compute_disable_serial_port_access" { } module "orgpolicy_compute_restrict_shared_vpc_host_projects" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -106,7 +106,7 @@ module "orgpolicy_compute_restrict_shared_vpc_host_projects" { module "orgpolicy_compute_skip_default_network_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -117,7 +117,7 @@ module "orgpolicy_compute_skip_default_network_creation" { } module "orgpolicy_compute_trusted_image_projects" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -129,7 +129,7 @@ module "orgpolicy_compute_trusted_image_projects" { } module "orgpolicy_compute_vm_can_ip_forward" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -142,7 +142,7 @@ module "orgpolicy_compute_vm_can_ip_forward" { module "orgpolicy_compute_vm_external_ip_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -155,7 +155,7 @@ module "orgpolicy_compute_vm_external_ip_access" { module "orgpolicy_compute_restrict_xpn_project_lien_removal" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -168,7 +168,7 @@ module "orgpolicy_compute_restrict_xpn_project_lien_removal" { # Cloud Identity and Access Management module "orgpolicy_iam_allowed_policy_member_domains" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -182,7 +182,7 @@ module "orgpolicy_iam_allowed_policy_member_domains" { # https://medium.com/@jryancanty/stop-downloading-google-cloud-service-account-keys-1811d44a97d9 module "orgpolicy_disable_service_account_key_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -194,7 +194,7 @@ module "orgpolicy_disable_service_account_key_creation" { module "orgpolicy_disable_service_account_key_upload" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -206,7 +206,7 @@ module "orgpolicy_disable_service_account_key_upload" { module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -219,7 +219,7 @@ module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { # Google Cloud Platform - Resource Locations module "orgpolicy_gcp_resource_locations" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" @@ -233,7 +233,7 @@ module "orgpolicy_gcp_resource_locations" { # Cloud Storage module "orgpolicy_storage_uniform_bucket_level_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "organization" organization_id = "12345678" diff --git a/examples/tfengine/generated/resources_only/resources/main.tf b/examples/tfengine/generated/resources_only/resources/main.tf index d541f7faa..d0b09d114 100644 --- a/examples/tfengine/generated/resources_only/resources/main.tf +++ b/examples/tfengine/generated/resources_only/resources/main.tf @@ -36,7 +36,7 @@ module "project" { module "one_billion_ms_example_dataset" { source = "terraform-google-modules/bigquery/google" - version = "~> 5.3.0" + version = "~> 5.4.0" dataset_id = "1billion_ms_example_dataset" project_id = module.project.project_id diff --git a/examples/tfengine/generated/team/additional_iam_members/main.tf b/examples/tfengine/generated/team/additional_iam_members/main.tf index 474cee38a..d275cdbe0 100644 --- a/examples/tfengine/generated/team/additional_iam_members/main.tf +++ b/examples/tfengine/generated/team/additional_iam_members/main.tf @@ -27,7 +27,7 @@ terraform { module "storage_bucket_iam_members" { source = "terraform-google-modules/iam/google//modules/storage_buckets_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.storage_bucket_iam_members : @@ -39,7 +39,7 @@ module "storage_bucket_iam_members" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.project_iam_members : @@ -51,7 +51,7 @@ module "project_iam_members" { module "folder_iam_members" { source = "terraform-google-modules/iam/google//modules/folders_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.folder_iam_members : @@ -63,7 +63,7 @@ module "folder_iam_members" { module "organization_iam_members" { source = "terraform-google-modules/iam/google//modules/organizations_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.organization_iam_members : @@ -75,7 +75,7 @@ module "organization_iam_members" { module "service_account_iam_members" { source = "terraform-google-modules/iam/google//modules/service_accounts_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.service_account_iam_members : diff --git a/examples/tfengine/generated/team/devops/main.tf b/examples/tfengine/generated/team/devops/main.tf index dca0f1d6d..a0cbf18af 100644 --- a/examples/tfengine/generated/team/devops/main.tf +++ b/examples/tfengine/generated/team/devops/main.tf @@ -15,7 +15,7 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.0, <= 3.71" + google = "<= 3.90" google-beta = "~>3.50" kubernetes = "~> 2.10" } @@ -78,7 +78,7 @@ module "state_bucket" { # Devops project owners group. module "owners_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-devops-owners@example.com" customer_id = "c12345678" @@ -108,7 +108,7 @@ resource "google_project_iam_binding" "devops_owners" { # Admins group for at folder level. module "admins_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-team-admins@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/team/groups/main.tf b/examples/tfengine/generated/team/groups/main.tf index 6b27ffc50..bbc304944 100644 --- a/examples/tfengine/generated/team/groups/main.tf +++ b/examples/tfengine/generated/team/groups/main.tf @@ -42,7 +42,7 @@ provider "google-beta" { module "example_cicd_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-viewers@example.com" customer_id = "c12345678" @@ -51,7 +51,7 @@ module "example_cicd_viewers_example_com" { module "example_cicd_editors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-cicd-editors@example.com" customer_id = "c12345678" @@ -60,7 +60,7 @@ module "example_cicd_editors_example_com" { module "example_apps_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-apps-viewers@example.com" customer_id = "c12345678" @@ -69,7 +69,7 @@ module "example_apps_viewers_example_com" { module "example_data_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-data-viewers@example.com" customer_id = "c12345678" @@ -78,7 +78,7 @@ module "example_data_viewers_example_com" { module "example_healthcare_dataset_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-healthcare-dataset-viewers@example.com" customer_id = "c12345678" @@ -87,7 +87,7 @@ module "example_healthcare_dataset_viewers_example_com" { module "example_fhir_viewers_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-fhir-viewers@example.com" customer_id = "c12345678" @@ -96,7 +96,7 @@ module "example_fhir_viewers_example_com" { module "example_bastion_accessors_example_com" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "example-bastion-accessors@example.com" customer_id = "c12345678" diff --git a/examples/tfengine/generated/team/kubernetes/main.tf b/examples/tfengine/generated/team/kubernetes/main.tf index 04b7d2764..8c0a0b5bd 100644 --- a/examples/tfengine/generated/team/kubernetes/main.tf +++ b/examples/tfengine/generated/team/kubernetes/main.tf @@ -74,7 +74,7 @@ resource "kubernetes_namespace" "namespace" { module "workload_identity_namespace" { source = "terraform-google-modules/kubernetes-engine/google//modules/workload-identity" - version = "16.1.0" + version = "16.1.1" project_id = module.project.project_id name = "runner" diff --git a/examples/tfengine/generated/team/project_apps/main.tf b/examples/tfengine/generated/team/project_apps/main.tf index cba237a3c..d8a168e5c 100644 --- a/examples/tfengine/generated/team/project_apps/main.tf +++ b/examples/tfengine/generated/team/project_apps/main.tf @@ -233,7 +233,7 @@ module "gke_cluster" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" projects = [module.project.project_id] mode = "additive" diff --git a/examples/tfengine/generated/team/project_data/main.tf b/examples/tfengine/generated/team/project_data/main.tf index 4f944b54a..ecc9af540 100644 --- a/examples/tfengine/generated/team/project_data/main.tf +++ b/examples/tfengine/generated/team/project_data/main.tf @@ -81,7 +81,7 @@ module "project" { module "one_billion_ms_dataset" { source = "terraform-google-modules/bigquery/google" - version = "~> 5.3.0" + version = "~> 5.4.0" dataset_id = "1billion_ms_dataset" project_id = module.project.project_id @@ -220,7 +220,7 @@ module "healthcare_dataset" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" projects = [module.project.project_id] mode = "additive" diff --git a/examples/tfengine/generated/team/project_networks/main.tf b/examples/tfengine/generated/team/project_networks/main.tf index e70589307..5b93fd2d8 100644 --- a/examples/tfengine/generated/team/project_networks/main.tf +++ b/examples/tfengine/generated/team/project_networks/main.tf @@ -91,7 +91,7 @@ EOF module "network" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "network" project_id = module.project.project_id @@ -145,7 +145,7 @@ module "cloud_sql_private_service_access_network" { module "router" { source = "terraform-google-modules/cloud-router/google" - version = "~> 1.2.0" + version = "~> 1.3.0" name = "router" project = module.project.project_id diff --git a/examples/tfengine/generated/team/project_secrets/main.tf b/examples/tfengine/generated/team/project_secrets/main.tf index ffbf242a3..6152574ad 100644 --- a/examples/tfengine/generated/team/project_secrets/main.tf +++ b/examples/tfengine/generated/team/project_secrets/main.tf @@ -15,7 +15,7 @@ terraform { required_version = ">=0.14" required_providers { - google = ">=3.0, <= 3.71" + google = "<= 3.90" google-beta = "~>3.50" null = "~> 3.0" kubernetes = "~> 2.10" diff --git a/templates/tfengine/components/audit/main.tf b/templates/tfengine/components/audit/main.tf index 0940aa530..4da9d1f19 100644 --- a/templates/tfengine/components/audit/main.tf +++ b/templates/tfengine/components/audit/main.tf @@ -42,7 +42,7 @@ resource "google_{{.parent_type}}_iam_audit_config" "config" { module "bigquery_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.8.0" log_sink_name = "{{get .logs_bigquery_dataset "sink_name" "bigquery-audit-logs-sink"}}" destination_uri = "${module.bigquery_destination.destination_uri}" @@ -55,7 +55,7 @@ module "bigquery_export" { module "bigquery_destination" { source = "terraform-google-modules/log-export/google//modules/bigquery" - version = "~> 7.3.0" + version = "~> 7.8.0" dataset_name = "{{.logs_bigquery_dataset.dataset_id}}" project_id = module.project.project_id @@ -66,7 +66,7 @@ module "bigquery_destination" { module "storage_export" { source = "terraform-google-modules/log-export/google" - version = "~> 7.3.0" + version = "~> 7.8.0" log_sink_name = "{{get .logs_storage_bucket "sink_name" "storage-audit-logs-sink"}}" destination_uri = "${module.storage_destination.destination_uri}" @@ -82,7 +82,7 @@ module "storage_export" { // and set the actual expiry to be greater than this amount (7 years). module "storage_destination" { source = "terraform-google-modules/log-export/google//modules/storage" - version = "~> 7.3.0" + version = "~> 7.8.0" storage_bucket_name = "{{.logs_storage_bucket.name}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/devops/main.tf b/templates/tfengine/components/devops/main.tf index 20167570c..081f4da15 100644 --- a/templates/tfengine/components/devops/main.tf +++ b/templates/tfengine/components/devops/main.tf @@ -79,7 +79,7 @@ source = "terraform-google-modules/cloud-storage/google//modules/simple_bucket" # Devops project owners group. module "owners_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "{{.project.owners_group.id}}" customer_id = "{{.project.owners_group.customer_id}}" @@ -124,7 +124,7 @@ resource "google_project_iam_binding" "devops_owners" { # Admins group for at {{.parent_type}} level. module "admins_group" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "{{.admins_group.id}}" customer_id = "{{.admins_group.customer_id}}" diff --git a/templates/tfengine/components/iam_members/main.tf b/templates/tfengine/components/iam_members/main.tf index 661e25b64..e1892bbad 100644 --- a/templates/tfengine/components/iam_members/main.tf +++ b/templates/tfengine/components/iam_members/main.tf @@ -14,7 +14,7 @@ limitations under the License. */ -}} module "storage_bucket_iam_members" { source = "terraform-google-modules/iam/google//modules/storage_buckets_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.storage_bucket_iam_members : @@ -26,7 +26,7 @@ module "storage_bucket_iam_members" { module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.project_iam_members : @@ -38,7 +38,7 @@ module "project_iam_members" { module "folder_iam_members" { source = "terraform-google-modules/iam/google//modules/folders_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.folder_iam_members : @@ -50,7 +50,7 @@ module "folder_iam_members" { module "organization_iam_members" { source = "terraform-google-modules/iam/google//modules/organizations_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.organization_iam_members : @@ -62,7 +62,7 @@ module "organization_iam_members" { module "service_account_iam_members" { source = "terraform-google-modules/iam/google//modules/service_accounts_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" mode = "additive" for_each = { for idx, member in var.service_account_iam_members : diff --git a/templates/tfengine/components/org_policies/main.tf b/templates/tfengine/components/org_policies/main.tf index 36f0da26e..4bf7bafc6 100644 --- a/templates/tfengine/components/org_policies/main.tf +++ b/templates/tfengine/components/org_policies/main.tf @@ -21,7 +21,7 @@ limitations under the License. */ -}} # App Engine module "orgpolicy_appengine_disable_code_download" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -34,7 +34,7 @@ module "orgpolicy_appengine_disable_code_download" { # Cloud SQL module "orgpolicy_sql_restrict_authorized_networks" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -46,7 +46,7 @@ module "orgpolicy_sql_restrict_authorized_networks" { module "orgpolicy_sql_restrict_public_ip" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -59,7 +59,7 @@ module "orgpolicy_sql_restrict_public_ip" { # Compute Engine module "orgpolicy_compute_disable_nested_virtualization" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -71,7 +71,7 @@ module "orgpolicy_compute_disable_nested_virtualization" { module "orgpolicy_compute_disable_serial_port_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -84,7 +84,7 @@ module "orgpolicy_compute_disable_serial_port_access" { {{- if index . "allowed_shared_vpc_host_projects"}} module "orgpolicy_compute_restrict_shared_vpc_host_projects" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -98,7 +98,7 @@ module "orgpolicy_compute_restrict_shared_vpc_host_projects" { module "orgpolicy_compute_skip_default_network_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -111,7 +111,7 @@ module "orgpolicy_compute_skip_default_network_creation" { {{- if index . "allowed_trusted_image_projects"}} module "orgpolicy_compute_trusted_image_projects" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -127,7 +127,7 @@ module "orgpolicy_compute_trusted_image_projects" { {{- if index . "allowed_ip_forwarding_vms"}} module "orgpolicy_compute_vm_can_ip_forward" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -141,7 +141,7 @@ module "orgpolicy_compute_vm_can_ip_forward" { module "orgpolicy_compute_vm_external_ip_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -154,7 +154,7 @@ module "orgpolicy_compute_vm_external_ip_access" { module "orgpolicy_compute_restrict_xpn_project_lien_removal" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -167,7 +167,7 @@ module "orgpolicy_compute_restrict_xpn_project_lien_removal" { # Cloud Identity and Access Management module "orgpolicy_iam_allowed_policy_member_domains" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -181,7 +181,7 @@ module "orgpolicy_iam_allowed_policy_member_domains" { # https://medium.com/@jryancanty/stop-downloading-google-cloud-service-account-keys-1811d44a97d9 module "orgpolicy_disable_service_account_key_creation" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -193,7 +193,7 @@ module "orgpolicy_disable_service_account_key_creation" { module "orgpolicy_disable_service_account_key_upload" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -205,7 +205,7 @@ module "orgpolicy_disable_service_account_key_upload" { module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -218,7 +218,7 @@ module "orgpolicy_disable_automatic_iam_grants_for_default_service_accounts" { # Google Cloud Platform - Resource Locations module "orgpolicy_gcp_resource_locations" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" @@ -232,7 +232,7 @@ module "orgpolicy_gcp_resource_locations" { # Cloud Storage module "orgpolicy_storage_uniform_bucket_level_access" { source = "terraform-google-modules/org-policy/google" - version = "~> 5.0.0" + version = "~> 5.4.0" policy_for = "{{.parent_type}}" {{$type_field}} = "{{.parent_id}}" diff --git a/templates/tfengine/components/resources/bigquery_datasets/main.tf b/templates/tfengine/components/resources/bigquery_datasets/main.tf index 3c2bb5d1b..d7702da0a 100644 --- a/templates/tfengine/components/resources/bigquery_datasets/main.tf +++ b/templates/tfengine/components/resources/bigquery_datasets/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range get . "bigquery_datasets"}} module "{{resourceName . "dataset_id"}}" { source = "terraform-google-modules/bigquery/google" - version = "~> 5.3.0" + version = "~> 5.4.0" dataset_id = "{{.dataset_id}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/resources/compute_networks/main.tf b/templates/tfengine/components/resources/compute_networks/main.tf index 44f3def9a..52f86a430 100644 --- a/templates/tfengine/components/resources/compute_networks/main.tf +++ b/templates/tfengine/components/resources/compute_networks/main.tf @@ -18,7 +18,7 @@ limitations under the License. */ -}} module "{{$resource_name}}" { source = "terraform-google-modules/network/google" - version = "~> 4.0.1" + version = "~> 4.1.0" network_name = "{{.name}}" project_id = module.project.project_id diff --git a/templates/tfengine/components/resources/compute_routers/main.tf b/templates/tfengine/components/resources/compute_routers/main.tf index 009a8b8cf..86501480e 100644 --- a/templates/tfengine/components/resources/compute_routers/main.tf +++ b/templates/tfengine/components/resources/compute_routers/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range .compute_routers}} module "{{resourceName . "name"}}" { source = "terraform-google-modules/cloud-router/google" - version = "~> 1.2.0" + version = "~> 1.3.0" name = "{{.name}}" project = module.project.project_id diff --git a/templates/tfengine/components/resources/groups/main.tf b/templates/tfengine/components/resources/groups/main.tf index 455b270d0..2e8bb1643 100644 --- a/templates/tfengine/components/resources/groups/main.tf +++ b/templates/tfengine/components/resources/groups/main.tf @@ -21,7 +21,7 @@ provider "google-beta" { {{range .groups}} module "{{resourceName . "id"}}" { source = "terraform-google-modules/group/google" - version = "~> 0.3" + version = "~> 0.7" id = "{{.id}}" customer_id = "{{.customer_id}}" diff --git a/templates/tfengine/components/resources/project_iam_members/main.tf b/templates/tfengine/components/resources/project_iam_members/main.tf index d97acf524..389f127c4 100644 --- a/templates/tfengine/components/resources/project_iam_members/main.tf +++ b/templates/tfengine/components/resources/project_iam_members/main.tf @@ -13,7 +13,7 @@ See the License for the specific language governing permissions and limitations under the License. */}} module "project_iam_members" { source = "terraform-google-modules/iam/google//modules/projects_iam" - version = "~> 7.4.0" + version = "~> 7.7.0" projects = [module.project.project_id] mode = "additive" diff --git a/templates/tfengine/components/resources/workload_identity/main.tf b/templates/tfengine/components/resources/workload_identity/main.tf index 541a45548..2e0463c62 100644 --- a/templates/tfengine/components/resources/workload_identity/main.tf +++ b/templates/tfengine/components/resources/workload_identity/main.tf @@ -15,7 +15,7 @@ limitations under the License. */ -}} {{range get . "workload_identity"}} module "workload_identity_{{resourceName . "namespace"}}" { source = "terraform-google-modules/kubernetes-engine/google//modules/workload-identity" - version = "16.1.0" + version = "16.1.1" project_id = "{{.project_id}}" name = "{{.google_service_account_id}}"