fix: Pin TLS provider version to 3.x versions only (#2174)

This commit is contained in:
Bryant Biggs
2022-07-22 08:29:00 -04:00
committed by GitHub
parent 640a99485e
commit d990ea8aff
8 changed files with 11 additions and 11 deletions

View File

@@ -1,6 +1,6 @@
repos:
- repo: https://github.com/antonbabenko/pre-commit-terraform
rev: v1.73.0
rev: v1.74.1
hooks:
- id: terraform_fmt
- id: terraform_validate

View File

@@ -210,7 +210,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.1 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.72 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | >= 3.0 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
## Providers
@@ -218,7 +218,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.72 |
| <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | >= 2.10 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | >= 3.0 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
## Modules

View File

@@ -60,14 +60,14 @@ Note that this example may create resources which cost money. Run `terraform des
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.1 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.72 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | >= 2.2 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
## Providers
| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.72 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | >= 2.2 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
## Modules

View File

@@ -8,7 +8,7 @@ terraform {
}
tls = {
source = "hashicorp/tls"
version = ">= 2.2"
version = "~> 3.0"
}
kubernetes = {
source = "hashicorp/kubernetes"

View File

@@ -28,14 +28,14 @@ Note that this example may create resources which cost money. Run `terraform des
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.1 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.72 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | >= 2.2 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
## Providers
| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.72 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | >= 2.2 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
## Modules

View File

@@ -8,7 +8,7 @@ terraform {
}
tls = {
source = "hashicorp/tls"
version = ">= 2.2"
version = "~> 3.0"
}
kubernetes = {
source = "hashicorp/kubernetes"

View File

@@ -91,7 +91,7 @@ module "kms" {
source = "terraform-aws-modules/kms/aws"
version = "1.0.2" # Note - be mindful of Terraform/provider version compatibility between modules
create = var.create_kms_key
create = local.create && var.create_kms_key
description = coalesce(var.kms_key_description, "${var.cluster_name} cluster encryption key")
key_usage = "ENCRYPT_DECRYPT"

View File

@@ -8,7 +8,7 @@ terraform {
}
tls = {
source = "hashicorp/tls"
version = ">= 3.0"
version = "~> 3.0"
}
kubernetes = {
source = "hashicorp/kubernetes"