fix: Pin TLS provider version to 3.x versions only (#2174)

This commit is contained in:
Bryant Biggs
2022-07-22 08:29:00 -04:00
committed by GitHub
parent 640a99485e
commit d990ea8aff
8 changed files with 11 additions and 11 deletions

View File

@@ -1,6 +1,6 @@
repos: repos:
- repo: https://github.com/antonbabenko/pre-commit-terraform - repo: https://github.com/antonbabenko/pre-commit-terraform
rev: v1.73.0 rev: v1.74.1
hooks: hooks:
- id: terraform_fmt - id: terraform_fmt
- id: terraform_validate - id: terraform_validate

View File

@@ -210,7 +210,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.1 | | <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.1 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.72 | | <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.72 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 | | <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | >= 3.0 | | <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
## Providers ## Providers
@@ -218,7 +218,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
|------|---------| |------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.72 | | <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.72 |
| <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | >= 2.10 | | <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | >= 2.10 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | >= 3.0 | | <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
## Modules ## Modules

View File

@@ -60,14 +60,14 @@ Note that this example may create resources which cost money. Run `terraform des
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.1 | | <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.1 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.72 | | <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.72 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 | | <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | >= 2.2 | | <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
## Providers ## Providers
| Name | Version | | Name | Version |
|------|---------| |------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.72 | | <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.72 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | >= 2.2 | | <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
## Modules ## Modules

View File

@@ -8,7 +8,7 @@ terraform {
} }
tls = { tls = {
source = "hashicorp/tls" source = "hashicorp/tls"
version = ">= 2.2" version = "~> 3.0"
} }
kubernetes = { kubernetes = {
source = "hashicorp/kubernetes" source = "hashicorp/kubernetes"

View File

@@ -28,14 +28,14 @@ Note that this example may create resources which cost money. Run `terraform des
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.1 | | <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.1 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.72 | | <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.72 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 | | <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 |
| <a name="requirement_tls"></a> [tls](#requirement\_tls) | >= 2.2 | | <a name="requirement_tls"></a> [tls](#requirement\_tls) | ~> 3.0 |
## Providers ## Providers
| Name | Version | | Name | Version |
|------|---------| |------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.72 | | <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.72 |
| <a name="provider_tls"></a> [tls](#provider\_tls) | >= 2.2 | | <a name="provider_tls"></a> [tls](#provider\_tls) | ~> 3.0 |
## Modules ## Modules

View File

@@ -8,7 +8,7 @@ terraform {
} }
tls = { tls = {
source = "hashicorp/tls" source = "hashicorp/tls"
version = ">= 2.2" version = "~> 3.0"
} }
kubernetes = { kubernetes = {
source = "hashicorp/kubernetes" source = "hashicorp/kubernetes"

View File

@@ -91,7 +91,7 @@ module "kms" {
source = "terraform-aws-modules/kms/aws" source = "terraform-aws-modules/kms/aws"
version = "1.0.2" # Note - be mindful of Terraform/provider version compatibility between modules version = "1.0.2" # Note - be mindful of Terraform/provider version compatibility between modules
create = var.create_kms_key create = local.create && var.create_kms_key
description = coalesce(var.kms_key_description, "${var.cluster_name} cluster encryption key") description = coalesce(var.kms_key_description, "${var.cluster_name} cluster encryption key")
key_usage = "ENCRYPT_DECRYPT" key_usage = "ENCRYPT_DECRYPT"

View File

@@ -8,7 +8,7 @@ terraform {
} }
tls = { tls = {
source = "hashicorp/tls" source = "hashicorp/tls"
version = ">= 3.0" version = "~> 3.0"
} }
kubernetes = { kubernetes = {
source = "hashicorp/kubernetes" source = "hashicorp/kubernetes"