From 37096c4467b02bcf7cf37b027a96f3505803a757 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 20 Jul 2023 09:44:27 +0000 Subject: [PATCH] =?UTF-8?q?=E2=AC=86=EF=B8=8F[Terraform]=20Update=20Terraf?= =?UTF-8?q?orm=20providers?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- terraform/layers/aws-secrets-manager/_settings.tf | 4 ++-- terraform/layers/azure-keyvault/_settings.tf | 6 +++--- terraform/layers/bootstrap/_settings.tf | 2 +- terraform/layers/gcp-secret-manager/_settings.tf | 6 +++--- terraform/layers/scw-secret-manager/_settings.tf | 4 ++-- 5 files changed, 11 insertions(+), 11 deletions(-) diff --git a/terraform/layers/aws-secrets-manager/_settings.tf b/terraform/layers/aws-secrets-manager/_settings.tf index 1208d1a3..a5472864 100644 --- a/terraform/layers/aws-secrets-manager/_settings.tf +++ b/terraform/layers/aws-secrets-manager/_settings.tf @@ -32,11 +32,11 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = "5.0.1" + version = "5.8.0" } github = { source = "integrations/github" - version = "5.25.1" + version = "5.31.0" } } } diff --git a/terraform/layers/azure-keyvault/_settings.tf b/terraform/layers/azure-keyvault/_settings.tf index 64c6f6d0..7842fd0b 100644 --- a/terraform/layers/azure-keyvault/_settings.tf +++ b/terraform/layers/azure-keyvault/_settings.tf @@ -32,15 +32,15 @@ terraform { required_providers { azurerm = { source = "hashicorp/azurerm" - version = "3.58.0" + version = "3.65.0" } azuread = { source = "hashicorp/azuread" - version = "2.39.0" + version = "2.40.0" } github = { source = "integrations/github" - version = "5.25.1" + version = "5.31.0" } } } diff --git a/terraform/layers/bootstrap/_settings.tf b/terraform/layers/bootstrap/_settings.tf index 26373776..1d29c202 100644 --- a/terraform/layers/bootstrap/_settings.tf +++ b/terraform/layers/bootstrap/_settings.tf @@ -19,7 +19,7 @@ terraform { required_providers { scaleway = { source = "scaleway/scaleway" - version = "2.19.0" + version = "2.25.1" } } } diff --git a/terraform/layers/gcp-secret-manager/_settings.tf b/terraform/layers/gcp-secret-manager/_settings.tf index d55efbaa..1f725ad0 100644 --- a/terraform/layers/gcp-secret-manager/_settings.tf +++ b/terraform/layers/gcp-secret-manager/_settings.tf @@ -32,15 +32,15 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = "4.66.0" + version = "4.74.0" } google-beta = { source = "hashicorp/google-beta" - version = "4.66.0" + version = "4.74.0" } github = { source = "integrations/github" - version = "5.25.1" + version = "5.31.0" } } } diff --git a/terraform/layers/scw-secret-manager/_settings.tf b/terraform/layers/scw-secret-manager/_settings.tf index c6046eb1..c4c11411 100644 --- a/terraform/layers/scw-secret-manager/_settings.tf +++ b/terraform/layers/scw-secret-manager/_settings.tf @@ -32,11 +32,11 @@ terraform { required_providers { scaleway = { source = "scaleway/scaleway" - version = "2.19.0" + version = "2.25.1" } github = { source = "integrations/github" - version = "5.25.1" + version = "5.31.0" } } }