Skip to content

Commit 933d856

Browse files
authored
fix: Update CI workflow versions to remove deprecated runtime warnings (#2)
1 parent 6470913 commit 933d856

File tree

12 files changed

+72
-62
lines changed

12 files changed

+72
-62
lines changed

.github/workflows/lock.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ jobs:
88
lock:
99
runs-on: ubuntu-latest
1010
steps:
11-
- uses: dessant/lock-threads@v4
11+
- uses: dessant/lock-threads@v5
1212
with:
1313
github-token: ${{ secrets.GITHUB_TOKEN }}
1414
issue-comment: >

.github/workflows/pr-title.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ jobs:
1414
steps:
1515
# Please look up the latest version from
1616
# https://github.com/amannn/action-semantic-pull-request/releases
17-
- uses: amannn/action-semantic-pull-request@v5.0.2
17+
- uses: amannn/action-semantic-pull-request@v5.4.0
1818
env:
1919
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
2020
with:

.github/workflows/pre-commit.yml

Lines changed: 26 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ on:
88

99
env:
1010
TERRAFORM_DOCS_VERSION: v0.16.0
11-
TFLINT_VERSION: v0.44.1
11+
TFLINT_VERSION: v0.50.3
1212

1313
jobs:
1414
collectInputs:
@@ -18,11 +18,11 @@ jobs:
1818
directories: ${{ steps.dirs.outputs.directories }}
1919
steps:
2020
- name: Checkout
21-
uses: actions/checkout@v3
21+
uses: actions/checkout@v4
2222

2323
- name: Get root directories
2424
id: dirs
25-
uses: clowdhaus/terraform-composite-actions/directories@v1.8.3
25+
uses: clowdhaus/terraform-composite-actions/directories@v1.9.0
2626

2727
preCommitMinVersions:
2828
name: Min TF pre-commit
@@ -32,19 +32,27 @@ jobs:
3232
matrix:
3333
directory: ${{ fromJson(needs.collectInputs.outputs.directories) }}
3434
steps:
35+
# https://github.com/orgs/community/discussions/25678#discussioncomment-5242449
36+
- name: Delete huge unnecessary tools folder
37+
run: |
38+
rm -rf /opt/hostedtoolcache/CodeQL
39+
rm -rf /opt/hostedtoolcache/Java_Temurin-Hotspot_jdk
40+
rm -rf /opt/hostedtoolcache/Ruby
41+
rm -rf /opt/hostedtoolcache/go
42+
3543
- name: Checkout
36-
uses: actions/checkout@v3
44+
uses: actions/checkout@v4
3745

3846
- name: Terraform min/max versions
3947
id: minMax
40-
uses: clowdhaus/terraform-min-max@v1.2.4
48+
uses: clowdhaus/terraform-min-max@v1.3.0
4149
with:
4250
directory: ${{ matrix.directory }}
4351

4452
- name: Pre-commit Terraform ${{ steps.minMax.outputs.minVersion }}
4553
# Run only validate pre-commit check on min version supported
4654
if: ${{ matrix.directory != '.' }}
47-
uses: clowdhaus/terraform-composite-actions/pre-commit@v1.8.3
55+
uses: clowdhaus/terraform-composite-actions/pre-commit@v1.9.0
4856
with:
4957
terraform-version: ${{ steps.minMax.outputs.minVersion }}
5058
tflint-version: ${{ env.TFLINT_VERSION }}
@@ -53,7 +61,7 @@ jobs:
5361
- name: Pre-commit Terraform ${{ steps.minMax.outputs.minVersion }}
5462
# Run only validate pre-commit check on min version supported
5563
if: ${{ matrix.directory == '.' }}
56-
uses: clowdhaus/terraform-composite-actions/pre-commit@v1.8.3
64+
uses: clowdhaus/terraform-composite-actions/pre-commit@v1.9.0
5765
with:
5866
terraform-version: ${{ steps.minMax.outputs.minVersion }}
5967
tflint-version: ${{ env.TFLINT_VERSION }}
@@ -64,18 +72,26 @@ jobs:
6472
runs-on: ubuntu-latest
6573
needs: collectInputs
6674
steps:
75+
# https://github.com/orgs/community/discussions/25678#discussioncomment-5242449
76+
- name: Delete huge unnecessary tools folder
77+
run: |
78+
rm -rf /opt/hostedtoolcache/CodeQL
79+
rm -rf /opt/hostedtoolcache/Java_Temurin-Hotspot_jdk
80+
rm -rf /opt/hostedtoolcache/Ruby
81+
rm -rf /opt/hostedtoolcache/go
82+
6783
- name: Checkout
68-
uses: actions/checkout@v3
84+
uses: actions/checkout@v4
6985
with:
7086
ref: ${{ github.event.pull_request.head.ref }}
7187
repository: ${{github.event.pull_request.head.repo.full_name}}
7288

7389
- name: Terraform min/max versions
7490
id: minMax
75-
uses: clowdhaus/terraform-min-max@v1.2.4
91+
uses: clowdhaus/terraform-min-max@v1.3.0
7692

7793
- name: Pre-commit Terraform ${{ steps.minMax.outputs.maxVersion }}
78-
uses: clowdhaus/terraform-composite-actions/pre-commit@v1.8.3
94+
uses: clowdhaus/terraform-composite-actions/pre-commit@v1.9.0
7995
with:
8096
terraform-version: ${{ steps.minMax.outputs.maxVersion }}
8197
tflint-version: ${{ env.TFLINT_VERSION }}

.github/workflows/release.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,18 +20,18 @@ jobs:
2020
if: github.repository_owner == 'terraform-aws-modules'
2121
steps:
2222
- name: Checkout
23-
uses: actions/checkout@v3
23+
uses: actions/checkout@v4
2424
with:
2525
persist-credentials: false
2626
fetch-depth: 0
2727

2828
- name: Release
29-
uses: cycjimmy/semantic-release-action@v3
29+
uses: cycjimmy/semantic-release-action@v4
3030
with:
31-
semantic_version: 18.0.0
31+
semantic_version: 23.0.2
3232
extra_plugins: |
33-
@semantic-release/changelog@6.0.0
34-
@semantic-release/git@10.0.0
35-
conventional-changelog-conventionalcommits@4.6.3
33+
@semantic-release/changelog@6.0.3
34+
@semantic-release/git@10.0.1
35+
conventional-changelog-conventionalcommits@7.0.2
3636
env:
3737
GITHUB_TOKEN: ${{ secrets.SEMANTIC_RELEASE_TOKEN }}

.github/workflows/stale-actions.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ jobs:
77
stale:
88
runs-on: ubuntu-latest
99
steps:
10-
- uses: actions/stale@v6
10+
- uses: actions/stale@v9
1111
with:
1212
repo-token: ${{ secrets.GITHUB_TOKEN }}
1313
# Staling issues and PR's

.pre-commit-config.yaml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
repos:
22
- repo: https://github.com/antonbabenko/pre-commit-terraform
3-
rev: v1.81.0
3+
rev: v1.88.0
44
hooks:
55
- id: terraform_fmt
66
- id: terraform_wrapper_module_for_each
@@ -22,9 +22,11 @@ repos:
2222
- '--args=--only=terraform_required_providers'
2323
- '--args=--only=terraform_standard_module_structure'
2424
- '--args=--only=terraform_workspace_remote'
25+
- '--args=--only=terraform_unused_required_providers'
2526
- id: terraform_validate
2627
- repo: https://github.com/pre-commit/pre-commit-hooks
27-
rev: v4.4.0
28+
rev: v4.5.0
2829
hooks:
2930
- id: check-merge-conflict
3031
- id: end-of-file-fixer
32+
- id: trailing-whitespace

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,6 @@ Examples codified under the [`examples`](https://github.com/terraform-aws-module
9494
| Name | Version |
9595
|------|---------|
9696
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 |
97-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.2 |
9897

9998
## Providers
10099

versions.tf

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,3 @@
11
terraform {
22
required_version = ">= 1.0"
3-
4-
required_providers {
5-
aws = {
6-
source = "hashicorp/aws"
7-
version = ">= 5.2"
8-
}
9-
}
103
}

wrappers/firewall/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,16 @@ module "wrapper" {
44
for_each = var.items
55

66
create = try(each.value.create, var.defaults.create, true)
7-
tags = try(each.value.tags, var.defaults.tags, {})
7+
create_logging_configuration = try(each.value.create_logging_configuration, var.defaults.create_logging_configuration, false)
88
delete_protection = try(each.value.delete_protection, var.defaults.delete_protection, true)
99
description = try(each.value.description, var.defaults.description, "")
1010
encryption_configuration = try(each.value.encryption_configuration, var.defaults.encryption_configuration, {})
1111
firewall_policy_arn = try(each.value.firewall_policy_arn, var.defaults.firewall_policy_arn, "")
1212
firewall_policy_change_protection = try(each.value.firewall_policy_change_protection, var.defaults.firewall_policy_change_protection, null)
13+
logging_configuration_destination_config = try(each.value.logging_configuration_destination_config, var.defaults.logging_configuration_destination_config, [])
1314
name = try(each.value.name, var.defaults.name, "")
1415
subnet_change_protection = try(each.value.subnet_change_protection, var.defaults.subnet_change_protection, true)
1516
subnet_mapping = try(each.value.subnet_mapping, var.defaults.subnet_mapping, {})
17+
tags = try(each.value.tags, var.defaults.tags, {})
1618
vpc_id = try(each.value.vpc_id, var.defaults.vpc_id, "")
17-
create_logging_configuration = try(each.value.create_logging_configuration, var.defaults.create_logging_configuration, false)
18-
logging_configuration_destination_config = try(each.value.logging_configuration_destination_config, var.defaults.logging_configuration_destination_config, [])
1919
}

wrappers/main.tf

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -4,34 +4,34 @@ module "wrapper" {
44
for_each = var.items
55

66
create = try(each.value.create, var.defaults.create, true)
7-
tags = try(each.value.tags, var.defaults.tags, {})
7+
create_logging_configuration = try(each.value.create_logging_configuration, var.defaults.create_logging_configuration, false)
8+
create_policy = try(each.value.create_policy, var.defaults.create_policy, true)
9+
create_policy_resource_policy = try(each.value.create_policy_resource_policy, var.defaults.create_policy_resource_policy, false)
810
delete_protection = try(each.value.delete_protection, var.defaults.delete_protection, true)
911
description = try(each.value.description, var.defaults.description, "")
1012
encryption_configuration = try(each.value.encryption_configuration, var.defaults.encryption_configuration, {})
1113
firewall_policy_arn = try(each.value.firewall_policy_arn, var.defaults.firewall_policy_arn, "")
1214
firewall_policy_change_protection = try(each.value.firewall_policy_change_protection, var.defaults.firewall_policy_change_protection, null)
13-
name = try(each.value.name, var.defaults.name, "")
14-
subnet_change_protection = try(each.value.subnet_change_protection, var.defaults.subnet_change_protection, true)
15-
subnet_mapping = try(each.value.subnet_mapping, var.defaults.subnet_mapping, {})
16-
vpc_id = try(each.value.vpc_id, var.defaults.vpc_id, "")
17-
create_logging_configuration = try(each.value.create_logging_configuration, var.defaults.create_logging_configuration, false)
1815
logging_configuration_destination_config = try(each.value.logging_configuration_destination_config, var.defaults.logging_configuration_destination_config, [])
19-
create_policy = try(each.value.create_policy, var.defaults.create_policy, true)
16+
name = try(each.value.name, var.defaults.name, "")
17+
policy_attach_resource_policy = try(each.value.policy_attach_resource_policy, var.defaults.policy_attach_resource_policy, false)
2018
policy_description = try(each.value.policy_description, var.defaults.policy_description, null)
2119
policy_encryption_configuration = try(each.value.policy_encryption_configuration, var.defaults.policy_encryption_configuration, {})
20+
policy_name = try(each.value.policy_name, var.defaults.policy_name, "")
21+
policy_ram_resource_associations = try(each.value.policy_ram_resource_associations, var.defaults.policy_ram_resource_associations, {})
22+
policy_resource_policy = try(each.value.policy_resource_policy, var.defaults.policy_resource_policy, "")
23+
policy_resource_policy_actions = try(each.value.policy_resource_policy_actions, var.defaults.policy_resource_policy_actions, [])
24+
policy_resource_policy_principals = try(each.value.policy_resource_policy_principals, var.defaults.policy_resource_policy_principals, [])
2225
policy_stateful_default_actions = try(each.value.policy_stateful_default_actions, var.defaults.policy_stateful_default_actions, [])
2326
policy_stateful_engine_options = try(each.value.policy_stateful_engine_options, var.defaults.policy_stateful_engine_options, {})
2427
policy_stateful_rule_group_reference = try(each.value.policy_stateful_rule_group_reference, var.defaults.policy_stateful_rule_group_reference, {})
2528
policy_stateless_custom_action = try(each.value.policy_stateless_custom_action, var.defaults.policy_stateless_custom_action, {})
2629
policy_stateless_default_actions = try(each.value.policy_stateless_default_actions, var.defaults.policy_stateless_default_actions, ["aws:pass"])
2730
policy_stateless_fragment_default_actions = try(each.value.policy_stateless_fragment_default_actions, var.defaults.policy_stateless_fragment_default_actions, ["aws:pass"])
2831
policy_stateless_rule_group_reference = try(each.value.policy_stateless_rule_group_reference, var.defaults.policy_stateless_rule_group_reference, {})
29-
policy_name = try(each.value.policy_name, var.defaults.policy_name, "")
3032
policy_tags = try(each.value.policy_tags, var.defaults.policy_tags, {})
31-
create_policy_resource_policy = try(each.value.create_policy_resource_policy, var.defaults.create_policy_resource_policy, false)
32-
policy_resource_policy_actions = try(each.value.policy_resource_policy_actions, var.defaults.policy_resource_policy_actions, [])
33-
policy_resource_policy_principals = try(each.value.policy_resource_policy_principals, var.defaults.policy_resource_policy_principals, [])
34-
policy_attach_resource_policy = try(each.value.policy_attach_resource_policy, var.defaults.policy_attach_resource_policy, false)
35-
policy_resource_policy = try(each.value.policy_resource_policy, var.defaults.policy_resource_policy, "")
36-
policy_ram_resource_associations = try(each.value.policy_ram_resource_associations, var.defaults.policy_ram_resource_associations, {})
33+
subnet_change_protection = try(each.value.subnet_change_protection, var.defaults.subnet_change_protection, true)
34+
subnet_mapping = try(each.value.subnet_mapping, var.defaults.subnet_mapping, {})
35+
tags = try(each.value.tags, var.defaults.tags, {})
36+
vpc_id = try(each.value.vpc_id, var.defaults.vpc_id, "")
3737
}

wrappers/policy/main.tf

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,22 +3,22 @@ module "wrapper" {
33

44
for_each = var.items
55

6+
attach_resource_policy = try(each.value.attach_resource_policy, var.defaults.attach_resource_policy, false)
67
create = try(each.value.create, var.defaults.create, true)
7-
tags = try(each.value.tags, var.defaults.tags, {})
8+
create_resource_policy = try(each.value.create_resource_policy, var.defaults.create_resource_policy, false)
89
description = try(each.value.description, var.defaults.description, null)
910
encryption_configuration = try(each.value.encryption_configuration, var.defaults.encryption_configuration, {})
11+
name = try(each.value.name, var.defaults.name, "")
12+
ram_resource_associations = try(each.value.ram_resource_associations, var.defaults.ram_resource_associations, {})
13+
resource_policy = try(each.value.resource_policy, var.defaults.resource_policy, "")
14+
resource_policy_actions = try(each.value.resource_policy_actions, var.defaults.resource_policy_actions, [])
15+
resource_policy_principals = try(each.value.resource_policy_principals, var.defaults.resource_policy_principals, [])
1016
stateful_default_actions = try(each.value.stateful_default_actions, var.defaults.stateful_default_actions, [])
1117
stateful_engine_options = try(each.value.stateful_engine_options, var.defaults.stateful_engine_options, {})
1218
stateful_rule_group_reference = try(each.value.stateful_rule_group_reference, var.defaults.stateful_rule_group_reference, {})
1319
stateless_custom_action = try(each.value.stateless_custom_action, var.defaults.stateless_custom_action, {})
1420
stateless_default_actions = try(each.value.stateless_default_actions, var.defaults.stateless_default_actions, ["aws:pass"])
1521
stateless_fragment_default_actions = try(each.value.stateless_fragment_default_actions, var.defaults.stateless_fragment_default_actions, ["aws:pass"])
1622
stateless_rule_group_reference = try(each.value.stateless_rule_group_reference, var.defaults.stateless_rule_group_reference, {})
17-
name = try(each.value.name, var.defaults.name, "")
18-
create_resource_policy = try(each.value.create_resource_policy, var.defaults.create_resource_policy, false)
19-
resource_policy_actions = try(each.value.resource_policy_actions, var.defaults.resource_policy_actions, [])
20-
resource_policy_principals = try(each.value.resource_policy_principals, var.defaults.resource_policy_principals, [])
21-
attach_resource_policy = try(each.value.attach_resource_policy, var.defaults.attach_resource_policy, false)
22-
resource_policy = try(each.value.resource_policy, var.defaults.resource_policy, "")
23-
ram_resource_associations = try(each.value.ram_resource_associations, var.defaults.ram_resource_associations, {})
23+
tags = try(each.value.tags, var.defaults.tags, {})
2424
}

wrappers/rule-group/main.tf

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,19 @@ module "wrapper" {
33

44
for_each = var.items
55

6-
create = try(each.value.create, var.defaults.create, true)
7-
tags = try(each.value.tags, var.defaults.tags, {})
6+
attach_resource_policy = try(each.value.attach_resource_policy, var.defaults.attach_resource_policy, false)
87
capacity = try(each.value.capacity, var.defaults.capacity, 100)
8+
create = try(each.value.create, var.defaults.create, true)
9+
create_resource_policy = try(each.value.create_resource_policy, var.defaults.create_resource_policy, false)
910
description = try(each.value.description, var.defaults.description, null)
1011
encryption_configuration = try(each.value.encryption_configuration, var.defaults.encryption_configuration, {})
1112
name = try(each.value.name, var.defaults.name, "")
13+
ram_resource_associations = try(each.value.ram_resource_associations, var.defaults.ram_resource_associations, {})
14+
resource_policy = try(each.value.resource_policy, var.defaults.resource_policy, "")
15+
resource_policy_actions = try(each.value.resource_policy_actions, var.defaults.resource_policy_actions, [])
16+
resource_policy_principals = try(each.value.resource_policy_principals, var.defaults.resource_policy_principals, [])
1217
rule_group = try(each.value.rule_group, var.defaults.rule_group, {})
1318
rules = try(each.value.rules, var.defaults.rules, null)
19+
tags = try(each.value.tags, var.defaults.tags, {})
1420
type = try(each.value.type, var.defaults.type, "STATELESS")
15-
create_resource_policy = try(each.value.create_resource_policy, var.defaults.create_resource_policy, false)
16-
resource_policy_actions = try(each.value.resource_policy_actions, var.defaults.resource_policy_actions, [])
17-
resource_policy_principals = try(each.value.resource_policy_principals, var.defaults.resource_policy_principals, [])
18-
attach_resource_policy = try(each.value.attach_resource_policy, var.defaults.attach_resource_policy, false)
19-
resource_policy = try(each.value.resource_policy, var.defaults.resource_policy, "")
20-
ram_resource_associations = try(each.value.ram_resource_associations, var.defaults.ram_resource_associations, {})
2121
}

0 commit comments

Comments
 (0)