Skip to content
This repository has been archived by the owner on Jul 26, 2024. It is now read-only.

Commit

Permalink
Merge pull request #474 from Azure/module.version.5.6.10
Browse files Browse the repository at this point in the history
Update module to version = "5.6.10"
  • Loading branch information
arnaudlh authored Jun 14, 2023
2 parents ea52207 + 2cd3f56 commit 79d036f
Show file tree
Hide file tree
Showing 7 changed files with 10 additions and 7 deletions.
2 changes: 1 addition & 1 deletion caf_launchpad/dynamic_secrets.tf
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

module "dynamic_keyvault_secrets" {
source = "aztfmod/caf/azurerm//modules/security/dynamic_keyvault_secrets"
version = "5.6.9"
version = "5.6.10"

for_each = try(var.dynamic_keyvault_secrets, {})

Expand Down
2 changes: 1 addition & 1 deletion caf_launchpad/landingzone.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "launchpad" {
source = "aztfmod/caf/azurerm"
version = "5.6.9"
version = "5.6.10"

providers = {
azurerm.vhub = azurerm.vhub
Expand Down
3 changes: 3 additions & 0 deletions caf_launchpad/scenario/200/configuration.tfvars
Original file line number Diff line number Diff line change
Expand Up @@ -92,3 +92,6 @@ resource_groups = {
}
}

provider_azurerm_features_resource_group = {
prevent_deletion_if_contains_resources = false
}
4 changes: 2 additions & 2 deletions caf_solution/add-ons/aks_applications_v2/app/module.tf
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ resource "kubernetes_namespace" "namespaces" {

resource "kubernetes_manifest" "cluster_manifest" {
for_each = var.manifests
manifest = try(yamldecode(each.value.contents), yamldecode(file("$(path.cwd)/each.value.file")), yamldecode(file("$(path.module)/each.value.file")), yamldecode(file(each.value.file)) )
manifest = try(yamldecode(each.value.contents), yamldecode(file("$(path.cwd)/each.value.file")), yamldecode(file("$(path.module)/each.value.file")), yamldecode(file(each.value.file)))
}

# https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release
Expand All @@ -26,7 +26,7 @@ resource "helm_release" "charts" {
timeout = try(each.value.timeout, 900)
skip_crds = try(each.value.skip_crds, false)
create_namespace = try(each.value.create_namespace, false)
values = try([ yamlencode(each.value.contents) ], [file("$(path.cwd)/each.value.file")], [file("$(path.module)/each.value.file")], [file(each.value.file)], [])
values = try([yamlencode(each.value.contents)], [file("$(path.cwd)/each.value.file")], [file("$(path.module)/each.value.file")], [file(each.value.file)], [])
version = try(each.value.version, null)
atomic = try(each.value.atomic, false)
lint = try(each.value.lint, false)
Expand Down
2 changes: 1 addition & 1 deletion caf_solution/dynamic_secrets.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "dynamic_keyvault_secrets" {
source = "aztfmod/caf/azurerm//modules/security/dynamic_keyvault_secrets"
version = "5.6.9"
version = "5.6.10"

for_each = {
for keyvault_key, secrets in try(var.dynamic_keyvault_secrets, {}) : keyvault_key => {
Expand Down
2 changes: 1 addition & 1 deletion caf_solution/landingzone.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "solution" {
source = "aztfmod/caf/azurerm"
version = "5.6.9"
version = "5.6.10"

providers = {
azurerm.vhub = azurerm.vhub
Expand Down
2 changes: 1 addition & 1 deletion caf_solution/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ provider "azurerm" {
# purge_soft_deleted_keys_on_destroy = var.provider_azurerm_features_keyvault.purge_soft_deleted_keys_on_destroy
# purge_soft_deleted_secrets_on_destroy = var.provider_azurerm_features_keyvault.purge_soft_deleted_secrets_on_destroy
# recover_soft_deleted_certificates = var.provider_azurerm_features_keyvault.recover_soft_deleted_certificates
recover_soft_deleted_key_vaults = try(var.provider_azurerm_features_keyvault.recover_soft_deleted_key_vaults, true)
recover_soft_deleted_key_vaults = try(var.provider_azurerm_features_keyvault.recover_soft_deleted_key_vaults, true)
# recover_soft_deleted_keys = var.provider_azurerm_features_keyvault.recover_soft_deleted_keys
# recover_soft_deleted_secrets = var.provider_azurerm_features_keyvault.recover_soft_deleted_secrets
}
Expand Down

0 comments on commit 79d036f

Please sign in to comment.