From 118e6eb6b798b90bfd8ed8cfb0088411d544592b Mon Sep 17 00:00:00 2001 From: Diego Lagos <92735530+diegolagospagopa@users.noreply.github.com> Date: Sun, 5 May 2024 19:46:41 +0200 Subject: [PATCH] fix: Storage module -> enable_resource_advanced_threat_protection variable removed (#293) * feat: Update module version to v8.8.0 * pre-commit fixs * data-indexer: removed enable_resource_advanced_threat_protection variable not used * added docs for removed variables * fix cdn storage * minor fix * pre-commit fixs --- api_management/README.md | 4 +- api_management_api/README.md | 2 +- api_management_product/README.md | 2 +- app_gateway/README.md | 6 +- .../README.md | 4 +- .../README.md | 2 +- azure_devops_agent/README.md | 6 +- azure_devops_agent_custom_image/README.md | 2 +- cdn/README.md | 9 +- cdn/main.tf | 5 +- cdn/tests/resources.tf | 3 + cdn/variables.tf | 6 - cert_mounter/README.md | 2 +- cosmosdb_account/README.md | 4 +- cosmosdb_mongodb_collection/README.md | 2 +- cosmosdb_sql_container/README.md | 2 +- cosmosdb_sql_database/README.md | 2 +- data_indexer/README.md | 2 +- data_indexer/storage.tf | 33 +++--- dns_forwarder/README.md | 4 +- dns_forwarder_lb_vmss/README.md | 10 +- dns_forwarder_lb_vmss/main.tf | 8 +- dns_forwarder_scale_set_vm/README.md | 4 +- dns_forwarder_vm_image/README.md | 2 +- function_app/README.md | 2 +- grafana/README.md | 2 +- grafana_dashboard/README.md | 2 +- jwt_keys/README.md | 2 +- key_vault/README.md | 2 +- key_vault_secrets_query/README.md | 2 +- kubernetes_cluster/README.md | 2 +- kubernetes_cluster_udr/README.md | 2 +- kubernetes_cluster_velero/01_main.tf | 2 +- kubernetes_cluster_velero/README.md | 4 +- kubernetes_pod_identity/README.md | 2 +- kubernetes_prometheus_install/README.md | 2 +- kubernetes_service_account/README.md | 2 +- kubernetes_storage_class/README.md | 2 +- kubernetes_velero_backup/README.md | 2 +- letsencrypt_credential/README.md | 2 +- monitoring_function/01_main.tf | 2 +- monitoring_function/README.md | 8 +- postgres_flexible_server/README.md | 8 +- postgres_flexible_server_replica/README.md | 4 +- postgresql_server/README.md | 4 +- redis_cache/README.md | 4 +- storage_account/README.md | 108 +++--------------- storage_management_policy/README.md | 2 +- subnet/README.md | 4 +- tls_checker/README.md | 2 +- virtual_network/README.md | 2 +- virtual_network_peering/README.md | 2 +- vm_scale_set/README.md | 2 +- vpn_gateway/README.md | 4 +- 54 files changed, 121 insertions(+), 195 deletions(-) diff --git a/api_management/README.md b/api_management/README.md index 1a453b9c..83dc3cf0 100644 --- a/api_management/README.md +++ b/api_management/README.md @@ -33,7 +33,7 @@ resource "azurerm_resource_group" "rg_api" { # APIM subnet module "apim_snet" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v3.11.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "${local.program}-apim-snet" resource_group_name = data.azurerm_resource_group.rg_vnet.name virtual_network_name = data.azurerm_virtual_network.vnet.name @@ -48,7 +48,7 @@ module "apim_snet" { ########################### module "apim" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//api_management?ref=v3.11.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//api_management?ref=v8.8.0" name = "${local.program}-apim" diff --git a/api_management_api/README.md b/api_management_api/README.md index d474bc07..875b5452 100644 --- a/api_management_api/README.md +++ b/api_management_api/README.md @@ -30,7 +30,7 @@ locals { # } module "apim_devopslab_webapp_python_alpha_api_v1" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//api_management_api?ref=v3.11.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//api_management_api?ref=v8.8.0" name = local.apim_devopslab_webapp_python_alpha_api.api_name api_management_name = module.apim.name diff --git a/api_management_product/README.md b/api_management_product/README.md index a74b6c83..d0f83570 100644 --- a/api_management_product/README.md +++ b/api_management_product/README.md @@ -10,7 +10,7 @@ This module allow the creation of api management product, and associate to a gro ```ts module "apim_product_devopslab" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//api_management_product?ref=v3.11.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//api_management_product?ref=v8.8.0" product_id = "devopslab" display_name = "DevOpsLab Program" diff --git a/app_gateway/README.md b/app_gateway/README.md index c02374ee..52d1bfb5 100644 --- a/app_gateway/README.md +++ b/app_gateway/README.md @@ -42,7 +42,7 @@ resource "azurerm_key_vault_access_policy" "app_gateway_policy" { # Subnet to host the application gateway module "appgateway_snet" { - source = "git::https://github.com/pagopa/azurerm.git//subnet?ref=v2.1.21" + source = "git::https://github.com/pagopa/azurerm.git//subnet?ref=v8.8.0" name = "${local.project}-appgateway-snet" address_prefixes = var.cidr_subnet_appgateway @@ -86,7 +86,7 @@ module "appgateway_snet" { # Subnet to host the application gateway module "appgateway_snet" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v3.11.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "${local.program}-appgateway-snet" address_prefixes = var.cidr_subnet_appgateway @@ -99,7 +99,7 @@ module "appgateway_snet" { module "app_gw" { count = var.app_gateway_is_enabled ? 1 : 0 - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//app_gateway?ref=v3.11.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//app_gateway?ref=v8.8.0" name = "${local.program}-app-gw" resource_group_name = data.azurerm_resource_group.rg_vnet.name diff --git a/application_insights_standard_web_test/README.md b/application_insights_standard_web_test/README.md index de69f2e5..585de51b 100644 --- a/application_insights_standard_web_test/README.md +++ b/application_insights_standard_web_test/README.md @@ -6,7 +6,7 @@ This module create an alert for a http(s) webservice ```hcl module "webservice_monitor_01" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//application_insights_standard_web_test?ref=vX.X.X" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//application_insights_standard_web_test?ref=v8.8.0" https_endpoint = "https://api.dev.platform.pagopa.it" @@ -21,4 +21,4 @@ module "webservice_monitor_01" { https_probe_body = "" https_probe_method = "POST" } -``` \ No newline at end of file +``` diff --git a/application_insights_web_test_preview/README.md b/application_insights_web_test_preview/README.md index fbf6223e..07af84f7 100644 --- a/application_insights_web_test_preview/README.md +++ b/application_insights_web_test_preview/README.md @@ -20,7 +20,7 @@ locals { module "web_test_availability_alert_rules_for_api" { for_each = { for v in local.test_urls : v.host => v if v != null } - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//application_insights_web_test_preview?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//application_insights_web_test_preview?ref=v8.8.0" subscription_id = data.azurerm_subscription.current.subscription_id name = "${each.value.host}-test-avail" diff --git a/azure_devops_agent/README.md b/azure_devops_agent/README.md index 53ae314b..ba012cb1 100644 --- a/azure_devops_agent/README.md +++ b/azure_devops_agent/README.md @@ -17,7 +17,7 @@ resource "azurerm_resource_group" "azdo_rg" { # with custom image (previously built. check the module `azure_devops_agent_custom_image` for more details) module "module "azdoa_vmss_li" {" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//azure_devops_agent?ref=" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//azure_devops_agent?ref=v8.8.0" count = var.enable_azdoa ? 1 : 0 name = "${local.azuredevops_agent_vm_name}" resource_group_name = azurerm_resource_group.azdo_rg[0].name @@ -33,7 +33,7 @@ module "module "azdoa_vmss_li" {" { # with default image module "module "azdoa_vmss_li" {" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//azure_devops_agent?ref=" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//azure_devops_agent?ref=v8.8.0" count = var.enable_azdoa ? 1 : 0 name = "${local.azuredevops_agent_vm_name}" resource_group_name = azurerm_resource_group.azdo_rg[0].name @@ -47,7 +47,7 @@ module "module "azdoa_vmss_li" {" { # with standard image module "module "azdoa_vmss_li" {" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//azure_devops_agent?ref=" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//azure_devops_agent?ref=v8.8.0" count = var.enable_azdoa ? 1 : 0 name = "${local.azuredevops_agent_vm_name}" resource_group_name = azurerm_resource_group.azdo_rg[0].name diff --git a/azure_devops_agent_custom_image/README.md b/azure_devops_agent_custom_image/README.md index e3b76b54..a80e7c47 100644 --- a/azure_devops_agent_custom_image/README.md +++ b/azure_devops_agent_custom_image/README.md @@ -29,7 +29,7 @@ data "azurerm_resource_group" "resource_group" { } module "azdoa_custom_image" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//azure_devops_agent_custom_image?ref=" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//azure_devops_agent_custom_image?ref=v8.8.0" resource_group_name = data.azurerm_resource_group.resource_group.name location = var.location image_name = "my_image_name" diff --git a/cdn/README.md b/cdn/README.md index b627778b..1c55ce34 100644 --- a/cdn/README.md +++ b/cdn/README.md @@ -6,6 +6,10 @@ This module allow the creation of a CDN endpoint and CDN profile ![This is an image](./docs/module-arch.drawio.png) +## Logical breaking changes + +* `resource_advanced_threat_protection_enabled` was removed -> use `advanced_threat_protection_enabled` + ## How to use it ```ts @@ -20,7 +24,7 @@ resource "azurerm_resource_group" "devopslab_cdn_rg" { ### Frontend resources #tfsec:ignore:azure-storage-queue-services-logging-enabled:exp:2022-05-01 # already ignored, maybe a bug in tfsec module "devopslab_cdn" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cdn?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cdn?ref=v8.8.0" name = "diego" prefix = local.product @@ -99,7 +103,7 @@ During the apply there will be 1 changed and 1 destroy related to storage see [s | Name | Source | Version | |------|--------|---------| -| [cdn\_storage\_account](#module\_cdn\_storage\_account) | github.com/pagopa/terraform-azurerm-v3.git//storage_account | v7.76.0 | +| [cdn\_storage\_account](#module\_cdn\_storage\_account) | github.com/pagopa/terraform-azurerm-v3.git//storage_account | v8.8.0 | ## Resources @@ -145,7 +149,6 @@ During the apply there will be 1 changed and 1 destroy related to storage see [s | [name](#input\_name) | n/a | `string` | n/a | yes | | [prefix](#input\_prefix) | n/a | `string` | n/a | yes | | [querystring\_caching\_behaviour](#input\_querystring\_caching\_behaviour) | n/a | `string` | `"IgnoreQueryString"` | no | -| [resource\_advanced\_threat\_protection\_enabled](#input\_resource\_advanced\_threat\_protection\_enabled) | Enabled azurerm\_advanced\_threat\_protection resource | `bool` | `true` | no | | [resource\_group\_name](#input\_resource\_group\_name) | n/a | `string` | n/a | yes | | [storage\_access\_tier](#input\_storage\_access\_tier) | n/a | `string` | `"Hot"` | no | | [storage\_account\_kind](#input\_storage\_account\_kind) | n/a | `string` | `"StorageV2"` | no | diff --git a/cdn/main.tf b/cdn/main.tf index f90b8a69..c569d1e7 100644 --- a/cdn/main.tf +++ b/cdn/main.tf @@ -7,7 +7,7 @@ locals { **/ module "cdn_storage_account" { - source = "github.com/pagopa/terraform-azurerm-v3.git//storage_account?ref=v7.76.0" + source = "github.com/pagopa/terraform-azurerm-v3.git//storage_account?ref=v8.8.0" name = replace("${var.prefix}-${var.name}-sa", "-", "") @@ -21,8 +21,7 @@ module "cdn_storage_account" { allow_nested_items_to_be_public = var.storage_account_nested_items_public public_network_access_enabled = true - advanced_threat_protection = var.advanced_threat_protection_enabled - enable_resource_advanced_threat_protection = var.resource_advanced_threat_protection_enabled + advanced_threat_protection = var.advanced_threat_protection_enabled index_document = var.index_document error_404_document = var.error_404_document diff --git a/cdn/tests/resources.tf b/cdn/tests/resources.tf index dbac83e5..dd7a6609 100644 --- a/cdn/tests/resources.tf +++ b/cdn/tests/resources.tf @@ -32,6 +32,9 @@ resource "azurerm_key_vault" "this" { tags = var.tags } +# +# CDN +# module "cdn" { source = "../../cdn" diff --git a/cdn/variables.tf b/cdn/variables.tf index de34b333..bc81791d 100644 --- a/cdn/variables.tf +++ b/cdn/variables.tf @@ -362,12 +362,6 @@ variable "advanced_threat_protection_enabled" { default = false } -variable "resource_advanced_threat_protection_enabled" { - type = bool - description = "Enabled azurerm_advanced_threat_protection resource" - default = true -} - variable "storage_account_nested_items_public" { type = bool default = true diff --git a/cert_mounter/README.md b/cert_mounter/README.md index a4e484a4..0fc6fd39 100644 --- a/cert_mounter/README.md +++ b/cert_mounter/README.md @@ -7,7 +7,7 @@ This module deploys the cert mounter blueprint in the target namespace, creating ```hcl module "cert_mounter" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cert_mounter?ref=" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cert_mounter?ref=v8.8.0" namespace = var.domain certificate_name = "${var.aks_cluster_domain_name}-${var.domain}-internal-${var.env}-cstar-pagopa-it" #name of the certificate stored in the given kv kv_name = data.azurerm_key_vault.kv.name diff --git a/cosmosdb_account/README.md b/cosmosdb_account/README.md index 3cc1717e..0b58c17a 100644 --- a/cosmosdb_account/README.md +++ b/cosmosdb_account/README.md @@ -12,7 +12,7 @@ This module allow the setup of a cosmos db account ```ts module "cosmos_mongo" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_account?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_account?ref=v8.8.0" name = "${local.project}-cosmos-mongo" location = var.location domain = var.domain @@ -69,7 +69,7 @@ module "cosmos_mongo" { ```ts module "cosmos_core" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_account?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_account?ref=v8.8.0" name = "${local.project}-cosmos-core" location = var.location domain = var.domain diff --git a/cosmosdb_mongodb_collection/README.md b/cosmosdb_mongodb_collection/README.md index c15773f9..a1c02153 100644 --- a/cosmosdb_mongodb_collection/README.md +++ b/cosmosdb_mongodb_collection/README.md @@ -10,7 +10,7 @@ This module allow the creation of a collection inside a MongoDB database ```ts module "mongdb_collection_name" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_mongodb_collection?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_mongodb_collection?ref=v8.8.0" name = "collectionName" resource_group_name = azurerm_resource_group.cosmos_mongo_rg[0].name diff --git a/cosmosdb_sql_container/README.md b/cosmosdb_sql_container/README.md index 25297fc2..425baf0a 100644 --- a/cosmosdb_sql_container/README.md +++ b/cosmosdb_sql_container/README.md @@ -32,7 +32,7 @@ locals { module "core_cosmosdb_containers" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_sql_container?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_sql_container?ref=v8.8.0" for_each = { for c in local.core_cosmosdb_containers : c.name => c } name = each.value.name diff --git a/cosmosdb_sql_database/README.md b/cosmosdb_sql_database/README.md index 27d4f977..1b65c320 100644 --- a/cosmosdb_sql_database/README.md +++ b/cosmosdb_sql_database/README.md @@ -38,7 +38,7 @@ resource "azurerm_cosmosdb_mongo_database" "mongo_db" { ```ts ## Database module "core_cosmos_db" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_sql_database?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//cosmosdb_sql_database?ref=v8.8.0" name = "db" resource_group_name = azurerm_resource_group.cosmos_rg[0].name account_name = module.cosmos_core.name diff --git a/data_indexer/README.md b/data_indexer/README.md index 67696663..f66c0341 100644 --- a/data_indexer/README.md +++ b/data_indexer/README.md @@ -19,7 +19,7 @@ Use the example Terraform template, saved in `./tests`, to test this module and | Name | Source | Version | |------|--------|---------| -| [internal\_storage\_account](#module\_internal\_storage\_account) | github.com/pagopa/terraform-azurerm-v3.git//storage_account | v7.76.0 | +| [internal\_storage\_account](#module\_internal\_storage\_account) | github.com/pagopa/terraform-azurerm-v3.git//storage_account | v8.8.0 | ## Resources diff --git a/data_indexer/storage.tf b/data_indexer/storage.tf index 6ca3181f..fde019fb 100644 --- a/data_indexer/storage.tf +++ b/data_indexer/storage.tf @@ -1,29 +1,28 @@ module "internal_storage_account" { - source = "github.com/pagopa/terraform-azurerm-v3.git//storage_account?ref=v7.76.0" + source = "github.com/pagopa/terraform-azurerm-v3.git//storage_account?ref=v8.8.0" - name = "${replace(var.name, "-", "")}dist" - account_kind = var.internal_storage.account_kind - account_tier = var.internal_storage.account_tier - account_replication_type = var.internal_storage.account_replication_type - access_tier = var.internal_storage.access_tier - resource_group_name = azurerm_resource_group.this.name - location = var.location - enable_resource_advanced_threat_protection = false - advanced_threat_protection = false - public_network_access_enabled = false + name = "${replace(var.name, "-", "")}dist" + account_kind = var.internal_storage.account_kind + account_tier = var.internal_storage.account_tier + account_replication_type = var.internal_storage.account_replication_type + access_tier = var.internal_storage.access_tier + resource_group_name = azurerm_resource_group.this.name + location = var.location + advanced_threat_protection = false + public_network_access_enabled = false tags = var.tags } resource "azurerm_private_endpoint" "blob" { - name = format("%s-blob-endpoint", module.internal_storage_account.name) + name = "${module.internal_storage_account.name}-blob-endpoint" location = var.location resource_group_name = azurerm_resource_group.this.name subnet_id = var.internal_storage.private_endpoint_subnet_id private_service_connection { - name = format("%s-blob", module.internal_storage_account.name) + name = "${module.internal_storage_account.name}-blob" private_connection_resource_id = module.internal_storage_account.id is_manual_connection = false subresource_names = ["blob"] @@ -38,13 +37,13 @@ resource "azurerm_private_endpoint" "blob" { } resource "azurerm_private_endpoint" "queue" { - name = format("%s-queue-endpoint", module.internal_storage_account.name) + name = "${module.internal_storage_account.name}-queue-endpoint" location = var.location resource_group_name = azurerm_resource_group.this.name subnet_id = var.internal_storage.private_endpoint_subnet_id private_service_connection { - name = format("%s-queue", module.internal_storage_account.name) + name = "${module.internal_storage_account.name}-queue" private_connection_resource_id = module.internal_storage_account.id is_manual_connection = false subresource_names = ["queue"] @@ -59,13 +58,13 @@ resource "azurerm_private_endpoint" "queue" { } resource "azurerm_private_endpoint" "table" { - name = format("%s-table-endpoint", module.internal_storage_account.name) + name = "${module.internal_storage_account.name}-table-endpoint" location = var.location resource_group_name = azurerm_resource_group.this.name subnet_id = var.internal_storage.private_endpoint_subnet_id private_service_connection { - name = format("%s-table", module.internal_storage_account.name) + name = "${module.internal_storage_account.name}-table" private_connection_resource_id = module.internal_storage_account.id is_manual_connection = false subresource_names = ["table"] diff --git a/dns_forwarder/README.md b/dns_forwarder/README.md index 46a29891..dba22dd4 100644 --- a/dns_forwarder/README.md +++ b/dns_forwarder/README.md @@ -21,7 +21,7 @@ resource "azurerm_resource_group" "dns_forwarder" { module "dns_forwarder_snet" { count = var.dns_forwarder_enabled ? 1 : 0 - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "${local.project}-dnsforwarder-snet" address_prefixes = var.cidr_subnet_dnsforwarder resource_group_name = azurerm_resource_group.rg_vnet.name @@ -38,7 +38,7 @@ module "dns_forwarder_snet" { } module "dns_forwarder" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//dns_forwarder?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//dns_forwarder?ref=v8.8.0" name = "${local.project}-dns-forwarder" location = var.location diff --git a/dns_forwarder_lb_vmss/README.md b/dns_forwarder_lb_vmss/README.md index 69978cc2..18cf1d2e 100644 --- a/dns_forwarder_lb_vmss/README.md +++ b/dns_forwarder_lb_vmss/README.md @@ -13,7 +13,7 @@ To secure the scale set, a Network Security Group has been added, allowing inbou module "dns_forwarder" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//dns_forwarder_lb_vmss?ref=7.48.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//dns_forwarder_lb_vmss?ref=v8.8.0" name = var.prefix virtual_network_name = azurerm_virtual_network.vnet.name @@ -43,10 +43,10 @@ module "dns_forwarder" { | Name | Source | Version | |------|--------|---------| -| [load\_balancer](#module\_load\_balancer) | git::https://github.com/pagopa/terraform-azurerm-v3.git//load_balancer | v7.76.0 | -| [subnet\_load\_balancer](#module\_subnet\_load\_balancer) | git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet | v7.76.0 | -| [subnet\_vmss](#module\_subnet\_vmss) | git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet | v7.76.0 | -| [vmss](#module\_vmss) | git::https://github.com/pagopa/terraform-azurerm-v3.git//vm_scale_set | v7.76.0 | +| [load\_balancer](#module\_load\_balancer) | git::https://github.com/pagopa/terraform-azurerm-v3.git//load_balancer | v8.8.0 | +| [subnet\_load\_balancer](#module\_subnet\_load\_balancer) | git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet | v8.8.0 | +| [subnet\_vmss](#module\_subnet\_vmss) | git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet | v8.8.0 | +| [vmss](#module\_vmss) | git::https://github.com/pagopa/terraform-azurerm-v3.git//vm_scale_set | v8.8.0 | ## Resources diff --git a/dns_forwarder_lb_vmss/main.tf b/dns_forwarder_lb_vmss/main.tf index 503829ff..a1cf95bd 100644 --- a/dns_forwarder_lb_vmss/main.tf +++ b/dns_forwarder_lb_vmss/main.tf @@ -15,7 +15,7 @@ locals { # module "subnet_vmss" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v7.76.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" count = var.subnet_vmss_id != null ? 0 : 1 name = "${local.prefix}-vmss-snet" @@ -29,7 +29,7 @@ module "subnet_vmss" { # module "subnet_load_balancer" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v7.76.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" count = var.subnet_lb_id != null ? 0 : 1 name = "${local.prefix}-lb-snet" @@ -100,7 +100,7 @@ resource "azurerm_subnet_network_security_group_association" "vmss" { # module "load_balancer" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//load_balancer?ref=v7.76.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//load_balancer?ref=v8.8.0" name = "${local.prefix}-internal" resource_group_name = var.resource_group_name @@ -150,7 +150,7 @@ module "load_balancer" { # module "vmss" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//vm_scale_set?ref=v7.76.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//vm_scale_set?ref=v8.8.0" name = local.prefix resource_group_name = var.resource_group_name diff --git a/dns_forwarder_scale_set_vm/README.md b/dns_forwarder_scale_set_vm/README.md index 448cb0f6..8b6ad17a 100644 --- a/dns_forwarder_scale_set_vm/README.md +++ b/dns_forwarder_scale_set_vm/README.md @@ -8,7 +8,7 @@ The dns forwarder vm expose port 53 in TCP/UDP for azure vpn ```hcl module "dns_forwarder_backup_snet" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v7.11.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" count = var.dns_forwarder_backup_is_enabled.uat || var.dns_forwarder_backup_is_enabled.prod ? 1 : 0 name = "${local.project}-dns-forwarder-backup-snet" address_prefixes = var.cidr_subnet_dns_forwarder_backup @@ -19,7 +19,7 @@ module "dns_forwarder_backup_snet" { # with default image module "dns_forwarder_backup_vmss_li" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//dns_forwarder_scale_set_vm?ref=dns-forwarder-scaleset-vm" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//dns_forwarder_scale_set_vm?ref=v8.8.0" count = var.dns_forwarder_backup_is_enabled.uat || var.dns_forwarder_backup_is_enabled.prod ? 1 : 0 name = local.dns_forwarder_backup_name resource_group_name = data.azurerm_resource_group.rg_vnet_core.name diff --git a/dns_forwarder_vm_image/README.md b/dns_forwarder_vm_image/README.md index b9d9e4bd..e697599d 100644 --- a/dns_forwarder_vm_image/README.md +++ b/dns_forwarder_vm_image/README.md @@ -32,7 +32,7 @@ Example: ```hcl module "dns_forwarder_image" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//dns_forwarder_vm_image?ref=dns-forwarder-scaleset-vm" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//dns_forwarder_vm_image?ref=v8.8.0" resource_group_name = data.azurerm_resource_group.rg_vnet_core.name location = var.location image_name = "${local.product}-dns-forwarder-ubuntu2204-image" diff --git a/function_app/README.md b/function_app/README.md index 07259d60..899908c1 100644 --- a/function_app/README.md +++ b/function_app/README.md @@ -55,7 +55,7 @@ E.g. **Docker** ```hcl module "authorizer_function_app" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//function_app?ref=v6.6.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//function_app?ref=v8.8.0" resource_group_name = data.azurerm_resource_group.shared_rg.name name = "${local.project}-authorizer-fn" diff --git a/grafana/README.md b/grafana/README.md index 1dcab51c..111f7268 100644 --- a/grafana/README.md +++ b/grafana/README.md @@ -15,7 +15,7 @@ resource "azurerm_resource_group" "load_test" { } module "grafana_managed" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//grafana?ref=feature/new_output_grafana" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//grafana?ref=v8.8.0" name = "${local.product}-grafana" diff --git a/grafana_dashboard/README.md b/grafana_dashboard/README.md index 37aa6700..49f25120 100644 --- a/grafana_dashboard/README.md +++ b/grafana_dashboard/README.md @@ -9,7 +9,7 @@ This module allow the creation of Grafana Dashboard to all "grafana = yes" tagge ```ts module "auto_dashboard" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//grafana_dashboard?ref=xxx" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//grafana_dashboard?ref=v8.8.0" grafana_url = azurerm_dashboard_grafana.grafana_dashboard.endpoint grafana_api_key = "GRAFANA_SERVICE_ACCOUNT_TOKEN" diff --git a/jwt_keys/README.md b/jwt_keys/README.md index 800dc280..ee9f382b 100644 --- a/jwt_keys/README.md +++ b/jwt_keys/README.md @@ -6,7 +6,7 @@ Module that allows the creation of an jwt keys. ```ts module "my_jwt" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//jwt_keys?ref=v3.4.1" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//jwt_keys?ref=v8.8.0" jwt_name = "my-jwt" key_vault_id = azurerm_key_vault.kv.id diff --git a/key_vault/README.md b/key_vault/README.md index 3dbebb43..1727fd0f 100644 --- a/key_vault/README.md +++ b/key_vault/README.md @@ -6,7 +6,7 @@ This module allow the creation of a key vault ```ts module "key_vault_domain" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//key_vault?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//key_vault?ref=v8.8.0" name = "${local.product}-${var.domain}-kv" location = azurerm_resource_group.sec_rg_domain.location diff --git a/key_vault_secrets_query/README.md b/key_vault_secrets_query/README.md index 119bfd9c..816ebfc5 100644 --- a/key_vault_secrets_query/README.md +++ b/key_vault_secrets_query/README.md @@ -6,7 +6,7 @@ This module simplified how to make the queries into a kv ```ts module "key_vault_secrets_query" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//key_vault_secrets_query?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//key_vault_secrets_query?ref=v8.8.0" resource_group = local.key_vault_resource_group key_vault_name = local.key_vault_name diff --git a/kubernetes_cluster/README.md b/kubernetes_cluster/README.md index 8ec972ae..ac7babcc 100644 --- a/kubernetes_cluster/README.md +++ b/kubernetes_cluster/README.md @@ -494,7 +494,7 @@ keda_helm_version = "2.6.2" } module "aks" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster?ref=v8.8.0" count = var.aks_enabled ? 1 : 0 diff --git a/kubernetes_cluster_udr/README.md b/kubernetes_cluster_udr/README.md index 14865da4..6aa96de8 100644 --- a/kubernetes_cluster_udr/README.md +++ b/kubernetes_cluster_udr/README.md @@ -492,7 +492,7 @@ keda_helm_version = "2.6.2" } module "aks" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster?ref=v8.8.0" count = var.aks_enabled ? 1 : 0 diff --git a/kubernetes_cluster_velero/01_main.tf b/kubernetes_cluster_velero/01_main.tf index f848c1f7..e38ff752 100644 --- a/kubernetes_cluster_velero/01_main.tf +++ b/kubernetes_cluster_velero/01_main.tf @@ -8,7 +8,7 @@ data "azurerm_kubernetes_cluster" "aks_cluster" { } module "velero_storage_account" { - source = "github.com/pagopa/terraform-azurerm-v3.git//storage_account?ref=v7.76.0" + source = "github.com/pagopa/terraform-azurerm-v3.git//storage_account?ref=v8.8.0" name = "${local.sa_prefix}velerosa" account_kind = var.storage_account_kind diff --git a/kubernetes_cluster_velero/README.md b/kubernetes_cluster_velero/README.md index f1542278..68d28685 100644 --- a/kubernetes_cluster_velero/README.md +++ b/kubernetes_cluster_velero/README.md @@ -15,7 +15,7 @@ This is achievable using the utility script `k8setup.sh` included in the aks-set } module "velero" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster_velero?ref=" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//kubernetes_cluster_velero?ref=v8.8.0" # required backup_storage_container_name = "velero-backup" @@ -60,7 +60,7 @@ This is achievable using the utility script `k8setup.sh` included in the aks-set | Name | Source | Version | |------|--------|---------| -| [velero\_storage\_account](#module\_velero\_storage\_account) | github.com/pagopa/terraform-azurerm-v3.git//storage_account | v7.76.0 | +| [velero\_storage\_account](#module\_velero\_storage\_account) | github.com/pagopa/terraform-azurerm-v3.git//storage_account | v8.8.0 | ## Resources diff --git a/kubernetes_pod_identity/README.md b/kubernetes_pod_identity/README.md index 9a9a1e8c..eb45da26 100644 --- a/kubernetes_pod_identity/README.md +++ b/kubernetes_pod_identity/README.md @@ -10,7 +10,7 @@ Module that allows the creation of a pod identity. Check [synthetic\_monitoring\_storage\_account](#module\_synthetic\_monitoring\_storage\_account) | git::https://github.com/pagopa/terraform-azurerm-v3.git//storage_account | v7.76.0 | +| [synthetic\_monitoring\_storage\_account](#module\_synthetic\_monitoring\_storage\_account) | git::https://github.com/pagopa/terraform-azurerm-v3.git//storage_account | v8.8.0 | ## Resources diff --git a/postgres_flexible_server/README.md b/postgres_flexible_server/README.md index 6847706c..d647e815 100644 --- a/postgres_flexible_server/README.md +++ b/postgres_flexible_server/README.md @@ -94,7 +94,7 @@ variable "pgflex_public_metric_alerts" { # Postgres Flexible Server subnet module "postgres_flexible_snet" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "${local.program}-pgres-flexible-snet" address_prefixes = var.cidr_subnet_flex_dbms resource_group_name = data.azurerm_resource_group.rg_vnet.name @@ -140,7 +140,7 @@ variable "pgflex_public_metric_alerts" { count = var.pgflex_private_config.enabled ? 1 : 0 - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgres_flexible_server?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgres_flexible_server?ref=v8.8.0" name = "${local.program}-private-pgflex" location = azurerm_resource_group.postgres_dbs.location @@ -200,7 +200,7 @@ variable "pgflex_public_metric_alerts" { count = var.pgflex_public_config.enabled ? 1 : 0 - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgres_flexible_server?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgres_flexible_server?ref=v8.8.0" name = "${local.program}-public-pgflex" location = azurerm_resource_group.postgres_dbs.location @@ -254,7 +254,7 @@ module "postgres_flexible_server_private" { count = var.pgflex_private_config.enabled ? 1 : 0 - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgres_flexible_server?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgres_flexible_server?ref=v8.8.0" name = "${local.program}-private-pgflex" location = azurerm_resource_group.postgres_dbs.location diff --git a/postgres_flexible_server_replica/README.md b/postgres_flexible_server_replica/README.md index 7254d938..227574b8 100644 --- a/postgres_flexible_server_replica/README.md +++ b/postgres_flexible_server_replica/README.md @@ -70,7 +70,7 @@ variable "main_server_additional_alerts" { # Postgres Flexible Server subnet module "postgres_flexible_snet_replica" { count = var.geo_replica_enabled ? 1 : 0 - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v6.2.1" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "${local.project_replica}-pgres-flexible-snet" address_prefixes = var.geo_replica_cidr_subnet_postgresql resource_group_name = data.azurerm_resource_group.rg_vnet.name @@ -112,7 +112,7 @@ variable "main_server_additional_alerts" { } module "postgresql_fdr_replica_db" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgres_flexible_server_replica?ref=" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgres_flexible_server_replica?ref=v8.8.0" count = var.geo_replica_enabled ? 1 : 0 name = "${local.project_replica}-flexible-postgresql" diff --git a/postgresql_server/README.md b/postgresql_server/README.md index 37f81b1a..b5507269 100644 --- a/postgresql_server/README.md +++ b/postgresql_server/README.md @@ -99,7 +99,7 @@ resource "azurerm_resource_group" "data_rg" { ## Database subnet module "postgres_snet" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "${local.project}-postgres-snet" address_prefixes = var.cidr_subnet_postgres resource_group_name = azurerm_resource_group.rg_vnet.name @@ -109,7 +109,7 @@ module "postgres_snet" { } module "postgres" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgresql_server?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//postgresql_server?ref=v8.8.0" name = "${local.project}-postgres" location = azurerm_resource_group.data_rg.location diff --git a/redis_cache/README.md b/redis_cache/README.md index 5bfeae93..2374ffa5 100644 --- a/redis_cache/README.md +++ b/redis_cache/README.md @@ -13,7 +13,7 @@ resource "azurerm_resource_group" "redis" { ## redisbase subnet module "redis_snet" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "${local.project}-redis-snet" address_prefixes = var.cidr_subnet_redis resource_group_name = azurerm_resource_group.rg_vnet.name @@ -22,7 +22,7 @@ module "redis_snet" { module "redis" { count = var.redis_enabled ? 1 : 0 - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//redis_cache?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//redis_cache?ref=v8.8.0" name = "${local.project}-redis" resource_group_name = azurerm_resource_group.redis.name location = azurerm_resource_group.redis.location diff --git a/storage_account/README.md b/storage_account/README.md index b9b2de84..dffd124f 100644 --- a/storage_account/README.md +++ b/storage_account/README.md @@ -8,124 +8,52 @@ In terraform output you can get the resource group name. ![architecture](./docs/module-arch.drawio.png) +## Logic breaking changes + +* `enable_resource_advanced_threat_protection` was removed -> now use only `advanced_threat_protection` + ## How to use it ### simple example Use the example Terraform template, saved in `tests`, to test this module. -### example with private network and public access denied - -```hcl -##### -module "backupstorage" { - count = 1 - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//storage_account?ref=v6.2.1" - - name = replace("${local.project}-backupstorage", "-", "") - account_kind = "StorageV2" - account_tier = "Standard" - account_replication_type = "GRS" - access_tier = "Cool" - blob_versioning_enabled = true - resource_group_name = azurerm_resource_group.rg_storage.name - location = var.location - allow_nested_items_to_be_public = false - advanced_threat_protection = true - enable_low_availability_alert = false - public_network_access_enabled = false - tags = var.tags -} - -resource "azurerm_private_endpoint" "backupstorage_private_endpoint" { - count = 1 - - name = "${local.project}-backupstorage-private-endpoint" - location = var.location - resource_group_name = azurerm_resource_group.rg_storage.name - subnet_id = module.private_endpoint_snet[0].id - - private_dns_zone_group { - name = "${local.project}-backupstorage-private-dns-zone-group" - private_dns_zone_ids = [azurerm_private_dns_zone.storage_account.id] - } - - private_service_connection { - name = "${local.project}-backupstorage-private-service-connection" - private_connection_resource_id = module.backupstorage[0].id - is_manual_connection = false - subresource_names = ["blob"] - } - - tags = var.tags - - depends_on = [ - module.backupstorage - ] -} - -# -# -# - -module "private_endpoint_snet" { - count = var.enable.core.private_endpoints_subnet ? 1 : 0 - - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v6.2.1" - name = "private-endpoint-snet" - resource_group_name = azurerm_resource_group.rg_vnet.name - virtual_network_name = module.vnet.name - address_prefixes = var.cidr_subnet_private_endpoint - - private_endpoint_network_policies_enabled = false - service_endpoints = [ - "Microsoft.Web", "Microsoft.AzureCosmosDB", "Microsoft.EventHub" - ] -} - -resource "azurerm_private_dns_zone" "storage_account" { - name = "privatelink.blob.core.windows.net" - resource_group_name = azurerm_resource_group.rg_vnet.name -} - -``` - ## Known Issues -- Applying the immutability policy on an existing storage account fails due to a 404 NotFound error on the threat protection creation for the new storage. Solution, delete the resource and create the new one with the immutability policy. -- Changing the `period_since_creation_in_days` will be updated in terraform state but not in the cloud provider resource. Solution, change the value using the Azure portal. +* Applying the immutability policy on an existing storage account fails due to a 404 NotFound error on the threat protection creation for the new storage. Solution, delete the resource and create the new one with the immutability policy. +* Changing the `period_since_creation_in_days` will be updated in terraform state but not in the cloud provider resource. Solution, change the value using the Azure portal. ## Migration from v2 🆕 To use this module you need to use change this variables/arguments: -- `blob_properties_delete_retention_policy_days` -> `blob_delete_retention_days` -- `allow_blob_public_access` -> `allow_nested_items_to_be_public` -- `enable_versioning` -> `blob_versioning_enabled` +* `blob_properties_delete_retention_policy_days` -> `blob_delete_retention_days` +* `allow_blob_public_access` -> `allow_nested_items_to_be_public` +* `enable_versioning` -> `blob_versioning_enabled` ❌ Don't use this variables: -- `enable_https_traffic_only` -> don't use any more, now default is true and mandatory -- `versioning_name` +* `enable_https_traffic_only` -> don't use any more, now default is true and mandatory +* `versioning_name` ❌ Don't use locks because are managed outside of the module: -- `lock_enabled` -- `lock_name` -- `lock_level` -- `lock_notes` +* `lock_enabled` +* `lock_name` +* `lock_level` +* `lock_notes` 🔥 destroied resources -- `module..azurerm_template_deployment.versioning[0]` is destroied becuase we use an internal variable and not more an arm. +* `module..azurerm_template_deployment.versioning[0]` is destroied becuase we use an internal variable and not more an arm. ### Migration results During the apply there will be this result: -- 1 changed (related to storage, that need to update one property `cross_tenant_replication_enabled`) +* 1 changed (related to storage, that need to update one property `cross_tenant_replication_enabled`) -- 2 destroy (related to storage, that need to destroy the old arm command for versioning `azurerm_template_deployment.versioning`) +* 2 destroy (related to storage, that need to destroy the old arm command for versioning `azurerm_template_deployment.versioning`) like this: diff --git a/storage_management_policy/README.md b/storage_management_policy/README.md index 9f13342a..3563c169 100644 --- a/storage_management_policy/README.md +++ b/storage_management_policy/README.md @@ -7,7 +7,7 @@ This module allow the creation of a management policy for storage account ```ts module "storage_account_durable_function_management_policy" { count = length(local.internal_containers) == 0 ? 0 : 1 - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//storage_management_policy?ref=v3.13.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//storage_management_policy?ref=v8.8.0" storage_account_id = module.storage_account_durable_function[0].id diff --git a/subnet/README.md b/subnet/README.md index f68bb3b9..e297401b 100644 --- a/subnet/README.md +++ b/subnet/README.md @@ -8,7 +8,7 @@ This module allow the creation of subnet ```ts module "private_endpoints_snet" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "${local.program}-private-endpoints-snet" address_prefixes = var.cidr_subnet_private_endpoints virtual_network_name = data.azurerm_virtual_network.vnet.name @@ -28,7 +28,7 @@ module "private_endpoints_snet" { ```ts module "funcs_diego_snet" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "${local.project}-funcs-snet" address_prefixes = var.cidr_subnet_funcs_diego_domain resource_group_name = data.azurerm_resource_group.rg_vnet_core.name diff --git a/tls_checker/README.md b/tls_checker/README.md index 17e3eed6..f72c9204 100644 --- a/tls_checker/README.md +++ b/tls_checker/README.md @@ -6,7 +6,7 @@ This modules allow the creation of a tls checker using n } diff --git a/vm_scale_set/README.md b/vm_scale_set/README.md index 4ad204fd..fca8d357 100644 --- a/vm_scale_set/README.md +++ b/vm_scale_set/README.md @@ -9,7 +9,7 @@ This module allows the creation of Linux virtual machine scale set (VMSS) with a # with default image module "vmss" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//vm_scale_set?ref=7.47.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//vm_scale_set?ref=v8.8.0" name = var.name resource_group_name = data.azurerm_resource_group.rg_vnet_core.name diff --git a/vpn_gateway/README.md b/vpn_gateway/README.md index 2748e7bc..94f728d3 100644 --- a/vpn_gateway/README.md +++ b/vpn_gateway/README.md @@ -7,7 +7,7 @@ This module allow the creation of vpn gateway ```ts ## VPN subnet module "vpn_snet" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//subnet?ref=v8.8.0" name = "GatewaySubnet" address_prefixes = var.cidr_subnet_vpn virtual_network_name = module.vnet.name @@ -21,7 +21,7 @@ data "azuread_application" "vpn_app" { } module "vpn" { - source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//vpn_gateway?ref=v3.15.0" + source = "git::https://github.com/pagopa/terraform-azurerm-v3.git//vpn_gateway?ref=v8.8.0" name = "${local.project}-vpn" location = var.location