From dd001619e70dee58c5c3e647af6846292daca177 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 14 Sep 2023 08:30:03 +0000 Subject: [PATCH] =?UTF-8?q?=E2=AC=86=EF=B8=8F[Terraform]=20Update=20Terraf?= =?UTF-8?q?orm=20providers?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- terraform/layers/aws-secrets-manager/_settings.tf | 4 ++-- terraform/layers/azure-keyvault/_settings.tf | 6 +++--- terraform/layers/bootstrap/_settings.tf | 2 +- terraform/layers/gcp-secret-manager/_settings.tf | 6 +++--- terraform/layers/scw-secret-manager/_settings.tf | 4 ++-- 5 files changed, 11 insertions(+), 11 deletions(-) diff --git a/terraform/layers/aws-secrets-manager/_settings.tf b/terraform/layers/aws-secrets-manager/_settings.tf index 1208d1a3..4f2ac433 100644 --- a/terraform/layers/aws-secrets-manager/_settings.tf +++ b/terraform/layers/aws-secrets-manager/_settings.tf @@ -32,11 +32,11 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = "5.0.1" + version = "5.16.2" } github = { source = "integrations/github" - version = "5.25.1" + version = "5.36.0" } } } diff --git a/terraform/layers/azure-keyvault/_settings.tf b/terraform/layers/azure-keyvault/_settings.tf index 64c6f6d0..d35ca105 100644 --- a/terraform/layers/azure-keyvault/_settings.tf +++ b/terraform/layers/azure-keyvault/_settings.tf @@ -32,15 +32,15 @@ terraform { required_providers { azurerm = { source = "hashicorp/azurerm" - version = "3.58.0" + version = "3.72.0" } azuread = { source = "hashicorp/azuread" - version = "2.39.0" + version = "2.41.0" } github = { source = "integrations/github" - version = "5.25.1" + version = "5.36.0" } } } diff --git a/terraform/layers/bootstrap/_settings.tf b/terraform/layers/bootstrap/_settings.tf index 26373776..940eb5c6 100644 --- a/terraform/layers/bootstrap/_settings.tf +++ b/terraform/layers/bootstrap/_settings.tf @@ -19,7 +19,7 @@ terraform { required_providers { scaleway = { source = "scaleway/scaleway" - version = "2.19.0" + version = "2.28.0" } } } diff --git a/terraform/layers/gcp-secret-manager/_settings.tf b/terraform/layers/gcp-secret-manager/_settings.tf index d55efbaa..4374411f 100644 --- a/terraform/layers/gcp-secret-manager/_settings.tf +++ b/terraform/layers/gcp-secret-manager/_settings.tf @@ -32,15 +32,15 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = "4.66.0" + version = "4.82.0" } google-beta = { source = "hashicorp/google-beta" - version = "4.66.0" + version = "4.82.0" } github = { source = "integrations/github" - version = "5.25.1" + version = "5.36.0" } } } diff --git a/terraform/layers/scw-secret-manager/_settings.tf b/terraform/layers/scw-secret-manager/_settings.tf index c6046eb1..e827335b 100644 --- a/terraform/layers/scw-secret-manager/_settings.tf +++ b/terraform/layers/scw-secret-manager/_settings.tf @@ -32,11 +32,11 @@ terraform { required_providers { scaleway = { source = "scaleway/scaleway" - version = "2.19.0" + version = "2.28.0" } github = { source = "integrations/github" - version = "5.25.1" + version = "5.36.0" } } }