From 74197d5ba52ccd3a9db073a701ed0617eee65a6e Mon Sep 17 00:00:00 2001 From: fernandoataoldotcom Date: Sat, 13 May 2023 10:16:00 -0700 Subject: [PATCH] chore: update aws version 4.64.0 > 4.67.0 (#17) * chore: update aws version 4.64.0 > 4.67.0 * terraform-docs: automated action * Update codespaces version --------- Co-authored-by: github-actions[bot] --- .../workflows/aws-cloud-regression-suite.yml | 6 ++--- README.md | 22 +++++++++---------- versions.tf | 2 +- 3 files changed, 15 insertions(+), 15 deletions(-) diff --git a/.github/workflows/aws-cloud-regression-suite.yml b/.github/workflows/aws-cloud-regression-suite.yml index 4264959..c9fbd1e 100644 --- a/.github/workflows/aws-cloud-regression-suite.yml +++ b/.github/workflows/aws-cloud-regression-suite.yml @@ -23,11 +23,11 @@ jobs: env: AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} run: | - docker run -v $(pwd):/app --workdir /app/tests --rm -e AWS_SECRET_ACCESS_KEY -e AWS_ACCESS_KEY_ID=AKIA3COQJC7C2PNUKZV4 -e AWS_DEFAULT_REGION=us-west-2 ghcr.io/glueops/codespaces:v0.21.2 ./run.sh + docker run -v $(pwd):/app --workdir /app/tests --rm -e AWS_SECRET_ACCESS_KEY -e AWS_ACCESS_KEY_ID=AKIA3COQJC7C2PNUKZV4 -e AWS_DEFAULT_REGION=us-west-2 ghcr.io/glueops/codespaces:v0.23.0 ./run.sh - name: Run AWS Destroy Only (in case previous step failed) env: AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} run: | - docker run -v $(pwd):/app --workdir /app/tests --rm -e AWS_SECRET_ACCESS_KEY -e AWS_ACCESS_KEY_ID=AKIA3COQJC7C2PNUKZV4 -e AWS_DEFAULT_REGION=us-west-2 ghcr.io/glueops/codespaces:v0.21.2 ./destroy-aws.sh - if: always() \ No newline at end of file + docker run -v $(pwd):/app --workdir /app/tests --rm -e AWS_SECRET_ACCESS_KEY -e AWS_ACCESS_KEY_ID=AKIA3COQJC7C2PNUKZV4 -e AWS_DEFAULT_REGION=us-west-2 ghcr.io/glueops/codespaces:v0.23.0 ./destroy-aws.sh + if: always() diff --git a/README.md b/README.md index 88a671d..d3383da 100644 --- a/README.md +++ b/README.md @@ -40,13 +40,13 @@ module "captain" { | Name | Version | |------|---------| -| [aws](#requirement\_aws) | 4.64.0 | +| [aws](#requirement\_aws) | 4.67.0 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | 4.64.0 | +| [aws](#provider\_aws) | 4.67.0 | ## Modules @@ -62,15 +62,15 @@ module "captain" { | Name | Type | |------|------| -| [aws_eks_addon.ebs_csi](https://registry.terraform.io/providers/hashicorp/aws/4.64.0/docs/resources/eks_addon) | resource | -| [aws_iam_role.eks_addon_ebs_csi_role](https://registry.terraform.io/providers/hashicorp/aws/4.64.0/docs/resources/iam_role) | resource | -| [aws_iam_role_policy_attachment.ebs_csi](https://registry.terraform.io/providers/hashicorp/aws/4.64.0/docs/resources/iam_role_policy_attachment) | resource | -| [aws_security_group.captain](https://registry.terraform.io/providers/hashicorp/aws/4.64.0/docs/resources/security_group) | resource | -| [aws_security_group_rule.allow_all_within_group](https://registry.terraform.io/providers/hashicorp/aws/4.64.0/docs/resources/security_group_rule) | resource | -| [aws_security_group_rule.captain_egress_all_ipv4](https://registry.terraform.io/providers/hashicorp/aws/4.64.0/docs/resources/security_group_rule) | resource | -| [aws_security_group_rule.captain_ingress_all_private](https://registry.terraform.io/providers/hashicorp/aws/4.64.0/docs/resources/security_group_rule) | resource | -| [aws_iam_openid_connect_provider.provider](https://registry.terraform.io/providers/hashicorp/aws/4.64.0/docs/data-sources/iam_openid_connect_provider) | data source | -| [aws_iam_policy_document.eks_assume_addon_role](https://registry.terraform.io/providers/hashicorp/aws/4.64.0/docs/data-sources/iam_policy_document) | data source | +| [aws_eks_addon.ebs_csi](https://registry.terraform.io/providers/hashicorp/aws/4.67.0/docs/resources/eks_addon) | resource | +| [aws_iam_role.eks_addon_ebs_csi_role](https://registry.terraform.io/providers/hashicorp/aws/4.67.0/docs/resources/iam_role) | resource | +| [aws_iam_role_policy_attachment.ebs_csi](https://registry.terraform.io/providers/hashicorp/aws/4.67.0/docs/resources/iam_role_policy_attachment) | resource | +| [aws_security_group.captain](https://registry.terraform.io/providers/hashicorp/aws/4.67.0/docs/resources/security_group) | resource | +| [aws_security_group_rule.allow_all_within_group](https://registry.terraform.io/providers/hashicorp/aws/4.67.0/docs/resources/security_group_rule) | resource | +| [aws_security_group_rule.captain_egress_all_ipv4](https://registry.terraform.io/providers/hashicorp/aws/4.67.0/docs/resources/security_group_rule) | resource | +| [aws_security_group_rule.captain_ingress_all_private](https://registry.terraform.io/providers/hashicorp/aws/4.67.0/docs/resources/security_group_rule) | resource | +| [aws_iam_openid_connect_provider.provider](https://registry.terraform.io/providers/hashicorp/aws/4.67.0/docs/data-sources/iam_openid_connect_provider) | data source | +| [aws_iam_policy_document.eks_assume_addon_role](https://registry.terraform.io/providers/hashicorp/aws/4.67.0/docs/data-sources/iam_policy_document) | data source | ## Inputs diff --git a/versions.tf b/versions.tf index e551ae1..f918cc9 100644 --- a/versions.tf +++ b/versions.tf @@ -2,7 +2,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = "4.64.0" + version = "4.67.0" } } }