diff --git a/0-bootstrap/modules/cb-private-pool/network.tf b/0-bootstrap/modules/cb-private-pool/network.tf index 308f56a9f..ea5546675 100644 --- a/0-bootstrap/modules/cb-private-pool/network.tf +++ b/0-bootstrap/modules/cb-private-pool/network.tf @@ -20,7 +20,7 @@ locals { module "peered_network" { source = "terraform-google-modules/network/google" - version = "~> 9.0" + version = "~> 10.0" count = var.private_worker_pool.create_peered_network ? 1 : 0 project_id = var.project_id @@ -90,7 +90,7 @@ resource "google_compute_network_peering_routes_config" "peering_routes" { module "firewall_rules" { source = "terraform-google-modules/network/google//modules/firewall-rules" - version = "~> 9.0" + version = "~> 10.0" count = var.private_worker_pool.enable_network_peering ? 1 : 0 project_id = var.project_id diff --git a/0-bootstrap/modules/jenkins-agent/main.tf b/0-bootstrap/modules/jenkins-agent/main.tf index c9651b743..58743d8c9 100644 --- a/0-bootstrap/modules/jenkins-agent/main.tf +++ b/0-bootstrap/modules/jenkins-agent/main.tf @@ -131,7 +131,7 @@ resource "google_tags_tag_value" "jenkins_agents" { module "jenkins_firewall_rules" { source = "terraform-google-modules/network/google//modules/network-firewall-policy" - version = "~> 9.0" + version = "~> 10.0" project_id = module.cicd_project.project_id policy_name = "fp-${google_compute_network.jenkins_agents.name}-jenkins-firewall" description = "Jenkins Agent GCE network firewall rules." diff --git a/0-bootstrap/modules/tfc-agent-gke/main.tf b/0-bootstrap/modules/tfc-agent-gke/main.tf index 2e631e3fd..30d19f123 100644 --- a/0-bootstrap/modules/tfc-agent-gke/main.tf +++ b/0-bootstrap/modules/tfc-agent-gke/main.tf @@ -34,7 +34,7 @@ resource "random_string" "suffix" { module "network" { source = "terraform-google-modules/network/google" - version = "~> 9.0" + version = "~> 10.0" project_id = var.project_id network_name = var.network_name @@ -372,7 +372,7 @@ resource "google_compute_firewall" "allow_private_api_egress" { module "private_service_connect" { source = "terraform-google-modules/network/google//modules/private-service-connect" - version = "~> 9.1" + version = "~> 10.0" project_id = var.project_id dns_code = "dz-${local.vpc_name}" diff --git a/3-networks-dual-svpc/envs/shared/dns-hub.tf b/3-networks-dual-svpc/envs/shared/dns-hub.tf index 10ffa7084..4c1a5f0d2 100644 --- a/3-networks-dual-svpc/envs/shared/dns-hub.tf +++ b/3-networks-dual-svpc/envs/shared/dns-hub.tf @@ -20,7 +20,7 @@ module "dns_hub_vpc" { source = "terraform-google-modules/network/google" - version = "~> 9.0" + version = "~> 10.0" project_id = local.dns_hub_project_id network_name = "vpc-net-dns" diff --git a/3-networks-dual-svpc/modules/base_shared_vpc/firewall.tf b/3-networks-dual-svpc/modules/base_shared_vpc/firewall.tf index 23ba8ccae..e0e59e3ff 100644 --- a/3-networks-dual-svpc/modules/base_shared_vpc/firewall.tf +++ b/3-networks-dual-svpc/modules/base_shared_vpc/firewall.tf @@ -19,7 +19,7 @@ *****************************************/ module "firewall_rules" { source = "terraform-google-modules/network/google//modules/network-firewall-policy" - version = "~> 9.0" + version = "~> 10.0" project_id = var.project_id policy_name = "fp-${var.environment_code}-dual-svpc-base-firewalls" description = "Firewall rules for base dual shared vpc: ${module.main.network_name}." diff --git a/3-networks-dual-svpc/modules/base_shared_vpc/main.tf b/3-networks-dual-svpc/modules/base_shared_vpc/main.tf index 25fb01aa3..31e3d7763 100644 --- a/3-networks-dual-svpc/modules/base_shared_vpc/main.tf +++ b/3-networks-dual-svpc/modules/base_shared_vpc/main.tf @@ -26,7 +26,7 @@ locals { module "main" { source = "terraform-google-modules/network/google" - version = "~> 9.0" + version = "~> 10.0" project_id = var.project_id network_name = local.network_name diff --git a/3-networks-dual-svpc/modules/base_shared_vpc/private_service_connect.tf b/3-networks-dual-svpc/modules/base_shared_vpc/private_service_connect.tf index 617c93930..0052c3009 100644 --- a/3-networks-dual-svpc/modules/base_shared_vpc/private_service_connect.tf +++ b/3-networks-dual-svpc/modules/base_shared_vpc/private_service_connect.tf @@ -17,7 +17,7 @@ module "private_service_connect" { source = "terraform-google-modules/network/google//modules/private-service-connect" - version = "~> 9.1" + version = "~> 10.0" project_id = var.project_id dns_code = "dz-${var.environment_code}-shared-base" diff --git a/3-networks-dual-svpc/modules/restricted_shared_vpc/firewall.tf b/3-networks-dual-svpc/modules/restricted_shared_vpc/firewall.tf index 53ee7c453..9d1aa6c54 100644 --- a/3-networks-dual-svpc/modules/restricted_shared_vpc/firewall.tf +++ b/3-networks-dual-svpc/modules/restricted_shared_vpc/firewall.tf @@ -20,7 +20,7 @@ *****************************************/ module "firewall_rules" { source = "terraform-google-modules/network/google//modules/network-firewall-policy" - version = "~> 9.0" + version = "~> 10.0" project_id = var.project_id policy_name = "fp-${var.environment_code}-dual-svpc-restricted-firewalls" description = "Firewall rules for restricted dual shared vpc: ${module.main.network_name}." diff --git a/3-networks-dual-svpc/modules/restricted_shared_vpc/main.tf b/3-networks-dual-svpc/modules/restricted_shared_vpc/main.tf index dfdf7cd50..54c2f648d 100644 --- a/3-networks-dual-svpc/modules/restricted_shared_vpc/main.tf +++ b/3-networks-dual-svpc/modules/restricted_shared_vpc/main.tf @@ -26,7 +26,7 @@ locals { module "main" { source = "terraform-google-modules/network/google" - version = "~> 9.0" + version = "~> 10.0" project_id = var.project_id network_name = local.network_name diff --git a/3-networks-dual-svpc/modules/restricted_shared_vpc/private_service_connect.tf b/3-networks-dual-svpc/modules/restricted_shared_vpc/private_service_connect.tf index 452625170..3294a0ce5 100644 --- a/3-networks-dual-svpc/modules/restricted_shared_vpc/private_service_connect.tf +++ b/3-networks-dual-svpc/modules/restricted_shared_vpc/private_service_connect.tf @@ -17,7 +17,7 @@ module "private_service_connect" { source = "terraform-google-modules/network/google//modules/private-service-connect" - version = "~> 9.1" + version = "~> 10.0" project_id = var.project_id dns_code = "dz-${var.environment_code}-shared-restricted" diff --git a/3-networks-hub-and-spoke/envs/shared/dns-hub.tf b/3-networks-hub-and-spoke/envs/shared/dns-hub.tf index 6f3dc2d96..8235754ef 100644 --- a/3-networks-hub-and-spoke/envs/shared/dns-hub.tf +++ b/3-networks-hub-and-spoke/envs/shared/dns-hub.tf @@ -20,7 +20,7 @@ module "dns_hub_vpc" { source = "terraform-google-modules/network/google" - version = "~> 9.0" + version = "~> 10.0" project_id = local.dns_hub_project_id network_name = "vpc-net-dns" diff --git a/3-networks-hub-and-spoke/modules/base_shared_vpc/firewall.tf b/3-networks-hub-and-spoke/modules/base_shared_vpc/firewall.tf index 0386b9a97..8ef228986 100644 --- a/3-networks-hub-and-spoke/modules/base_shared_vpc/firewall.tf +++ b/3-networks-hub-and-spoke/modules/base_shared_vpc/firewall.tf @@ -19,7 +19,7 @@ *****************************************/ module "firewall_rules" { source = "terraform-google-modules/network/google//modules/network-firewall-policy" - version = "~> 9.0" + version = "~> 10.0" project_id = var.project_id policy_name = "fp-${var.environment_code}-hub-and-spoke-base-firewalls" description = "Firewall rules for base hub and spoke shared vpc: ${module.main.network_name}." diff --git a/3-networks-hub-and-spoke/modules/base_shared_vpc/main.tf b/3-networks-hub-and-spoke/modules/base_shared_vpc/main.tf index eed177f9f..c353140d2 100644 --- a/3-networks-hub-and-spoke/modules/base_shared_vpc/main.tf +++ b/3-networks-hub-and-spoke/modules/base_shared_vpc/main.tf @@ -27,7 +27,7 @@ locals { module "main" { source = "terraform-google-modules/network/google" - version = "~> 9.0" + version = "~> 10.0" project_id = var.project_id network_name = local.network_name @@ -74,7 +74,7 @@ data "google_compute_network" "vpc_base_net_hub" { module "peering" { source = "terraform-google-modules/network/google//modules/network-peering" - version = "~> 9.0" + version = "~> 10.0" count = var.mode == "spoke" ? 1 : 0 prefix = "np" diff --git a/3-networks-hub-and-spoke/modules/base_shared_vpc/private_service_connect.tf b/3-networks-hub-and-spoke/modules/base_shared_vpc/private_service_connect.tf index 864e6ee37..c18e514e6 100644 --- a/3-networks-hub-and-spoke/modules/base_shared_vpc/private_service_connect.tf +++ b/3-networks-hub-and-spoke/modules/base_shared_vpc/private_service_connect.tf @@ -17,7 +17,7 @@ module "private_service_connect" { source = "terraform-google-modules/network/google//modules/private-service-connect" - version = "~> 9.1" + version = "~> 10.0" project_id = var.project_id dns_code = "dz-${var.environment_code}-shared-base" diff --git a/3-networks-hub-and-spoke/modules/restricted_shared_vpc/firewall.tf b/3-networks-hub-and-spoke/modules/restricted_shared_vpc/firewall.tf index 77fdff46b..178c847be 100644 --- a/3-networks-hub-and-spoke/modules/restricted_shared_vpc/firewall.tf +++ b/3-networks-hub-and-spoke/modules/restricted_shared_vpc/firewall.tf @@ -20,7 +20,7 @@ *****************************************/ module "firewall_rules" { source = "terraform-google-modules/network/google//modules/network-firewall-policy" - version = "~> 9.0" + version = "~> 10.0" project_id = var.project_id policy_name = "fp-${var.environment_code}-hub-and-spoke-restricted-firewalls" description = "Firewall rules for restricted hub and spoke shared vpc: ${module.main.network_name}." diff --git a/3-networks-hub-and-spoke/modules/restricted_shared_vpc/main.tf b/3-networks-hub-and-spoke/modules/restricted_shared_vpc/main.tf index b81619ea7..2c056e53f 100644 --- a/3-networks-hub-and-spoke/modules/restricted_shared_vpc/main.tf +++ b/3-networks-hub-and-spoke/modules/restricted_shared_vpc/main.tf @@ -27,7 +27,7 @@ locals { module "main" { source = "terraform-google-modules/network/google" - version = "~> 9.0" + version = "~> 10.0" project_id = var.project_id network_name = local.network_name @@ -76,7 +76,7 @@ data "google_compute_network" "vpc_restricted_net_hub" { module "peering" { source = "terraform-google-modules/network/google//modules/network-peering" - version = "~> 9.0" + version = "~> 10.0" count = var.mode == "spoke" ? 1 : 0 prefix = "np" diff --git a/3-networks-hub-and-spoke/modules/restricted_shared_vpc/private_service_connect.tf b/3-networks-hub-and-spoke/modules/restricted_shared_vpc/private_service_connect.tf index 33f407fa6..99a49440c 100644 --- a/3-networks-hub-and-spoke/modules/restricted_shared_vpc/private_service_connect.tf +++ b/3-networks-hub-and-spoke/modules/restricted_shared_vpc/private_service_connect.tf @@ -17,7 +17,7 @@ module "private_service_connect" { source = "terraform-google-modules/network/google//modules/private-service-connect" - version = "~> 9.1" + version = "~> 10.0" project_id = var.project_id dns_code = "dz-${var.environment_code}-shared-restricted" diff --git a/4-projects/modules/base_env/example_peering_project.tf b/4-projects/modules/base_env/example_peering_project.tf index 862836007..7aaf6368a 100644 --- a/4-projects/modules/base_env/example_peering_project.tf +++ b/4-projects/modules/base_env/example_peering_project.tf @@ -76,7 +76,7 @@ module "peering_project" { module "peering_network" { source = "terraform-google-modules/network/google" - version = "~> 9.0" + version = "~> 10.0" project_id = module.peering_project.project_id network_name = "vpc-${local.env_code}-peering-base" @@ -112,7 +112,7 @@ resource "google_dns_policy" "default_policy" { module "peering" { source = "terraform-google-modules/network/google//modules/network-peering" - version = "~> 9.0" + version = "~> 10.0" prefix = "${var.business_code}-${local.env_code}" local_network = module.peering_network.network_self_link @@ -125,7 +125,7 @@ module "peering" { *****************************************/ module "firewall_rules" { source = "terraform-google-modules/network/google//modules/network-firewall-policy" - version = "~> 9.0" + version = "~> 10.0" project_id = module.peering_project.project_id policy_name = "fp-${local.env_code}-peering-project-firewalls" description = "Firewall rules for Peering Network: ${module.peering_network.network_name}."