From 1e93a7340e8e127d702d0f9a49c8c82de7896a98 Mon Sep 17 00:00:00 2001 From: Bruno Schaatsbergen Date: Sun, 8 Jan 2023 12:32:02 +0100 Subject: [PATCH] pin the random provider --- README.md | 115 ++++++++++++++++++++++++++-------------------------- versions.tf | 4 ++ 2 files changed, 62 insertions(+), 57 deletions(-) diff --git a/README.md b/README.md index 9f1f782..b49aaaa 100644 --- a/README.md +++ b/README.md @@ -164,78 +164,79 @@ If all configurations are correct, it may take up to 25 minutes for the certific You can check the status of the certificate in the Google Cloud Console. - ## Requirements -| Name | Version | -| ------------------------------------------------------------------------ | --------- | -| [terraform](#requirement_terraform) | >= 0.13.0 | -| [cloudinit](#requirement_cloudinit) | >=2.2.0 | -| [google](#requirement_google) | >=4.47.0 | +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 0.13.0 | +| [cloudinit](#requirement\_cloudinit) | >=2.2.0 | +| [google](#requirement\_google) | >=4.47.0 | +| [random](#requirement\_random) | >=3.4.3 | ## Providers -| Name | Version | -| ------------------------------------------------------------------ | ------- | -| [cloudinit](#provider_cloudinit) | 2.2.0 | -| [google](#provider_google) | 4.47.0 | +| Name | Version | +|------|---------| +| [cloudinit](#provider\_cloudinit) | 2.2.0 | +| [google](#provider\_google) | 4.47.0 | +| [random](#provider\_random) | 3.4.3 | ## Modules -| Name | Source | Version | -| -------------------------------------------------------------- | -------------------------------------------- | ------- | -| [container](#module_container) | terraform-google-modules/container-vm/google | 3.1.0 | +| Name | Source | Version | +|------|--------|---------| +| [container](#module\_container) | terraform-google-modules/container-vm/google | 3.1.0 | ## Resources -| Name | Type | -| ----------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------- | -| [google_compute_backend_service.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_backend_service) | resource | -| [google_compute_backend_service.iap](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_backend_service) | resource | -| [google_compute_firewall.lb_health_check](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_firewall) | resource | -| [google_compute_global_address.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_address) | resource | -| [google_compute_global_forwarding_rule.https](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_forwarding_rule) | resource | -| [google_compute_health_check.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_health_check) | resource | -| [google_compute_health_check.default_instance_group_manager](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_health_check) | resource | -| [google_compute_instance_group_manager.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_instance_group_manager) | resource | -| [google_compute_instance_template.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_instance_template) | resource | -| [google_compute_managed_ssl_certificate.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_managed_ssl_certificate) | resource | -| [google_compute_route.public_internet](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_route) | resource | -| [google_compute_target_https_proxy.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_target_https_proxy) | resource | -| [google_compute_url_map.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_url_map) | resource | -| [cloudinit_config.config](https://registry.terraform.io/providers/hashicorp/cloudinit/latest/docs/data-sources/config) | data source | -| [google_compute_image.cos](https://registry.terraform.io/providers/hashicorp/google/latest/docs/data-sources/compute_image) | data source | +| Name | Type | +|------|------| +| [google_compute_backend_service.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_backend_service) | resource | +| [google_compute_backend_service.iap](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_backend_service) | resource | +| [google_compute_firewall.lb_health_check](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_firewall) | resource | +| [google_compute_global_address.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_address) | resource | +| [google_compute_global_forwarding_rule.https](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_global_forwarding_rule) | resource | +| [google_compute_health_check.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_health_check) | resource | +| [google_compute_health_check.default_instance_group_manager](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_health_check) | resource | +| [google_compute_instance_group_manager.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_instance_group_manager) | resource | +| [google_compute_instance_template.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_instance_template) | resource | +| [google_compute_managed_ssl_certificate.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_managed_ssl_certificate) | resource | +| [google_compute_route.public_internet](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_route) | resource | +| [google_compute_target_https_proxy.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_target_https_proxy) | resource | +| [google_compute_url_map.default](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_url_map) | resource | +| [random_string.random](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/string) | resource | +| [cloudinit_config.config](https://registry.terraform.io/providers/hashicorp/cloudinit/latest/docs/data-sources/config) | data source | +| [google_compute_image.cos](https://registry.terraform.io/providers/hashicorp/google/latest/docs/data-sources/compute_image) | data source | ## Inputs -| Name | Description | Type | Default | Required | -| --------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------ | ----------------------------------------------------------------------------- | :------: | -| [block_project_ssh_keys_enabled](#input_block_project_ssh_keys_enabled) | Blocks the use of project-wide publich SSH keys | `bool` | `false` | no | -| [disk_kms_key_self_link](#input_disk_kms_key_self_link) | The self link of the encryption key that is stored in Google Cloud KMS | `string` | `null` | no | -| [domain](#input_domain) | Domain to associate Atlantis with and to request a managed SSL certificate for. Without `https://` | `string` | n/a | yes | -| [env_vars](#input_env_vars) | Key-value pairs representing environment variables and their respective values | `map(any)` | n/a | yes | -| [iap](#input_iap) | Settings for enabling Cloud Identity Aware Proxy to protect the Atlantis UI |
object({
oauth2_client_id = string
oauth2_client_secret = string
})
| `null` | no | -| [image](#input_image) | Docker image. This is most often a reference to a container located in a container registry | `string` | `"ghcr.io/runatlantis/atlantis:latest"` | no | -| [machine_type](#input_machine_type) | The machine type to run Atlantis on | `string` | `"n2-standard-2"` | no | -| [name](#input_name) | Custom name that's used during resource creation | `string` | n/a | yes | -| [network](#input_network) | Name of the network | `string` | n/a | yes | -| [persistent_disk_size_gb](#input_persistent_disk_size_gb) | The size of the persistent disk that Atlantis uses to store its data on | `number` | `50` | no | -| [project](#input_project) | The ID of the project in which the resource belongs | `string` | `null` | no | -| [region](#input_region) | The region that resources should be created in | `string` | n/a | yes | -| [service_account](#input_service_account) | Service account to attach to the instance running Atlantis |
object({
email = string,
scopes = list(string)
})
|
{
"email": "",
"scopes": [
"cloud-platform"
]
}
| no | -| [spot_machine_enabled](#input_spot_machine_enabled) | A Spot VM is discounted Compute Engine capacity that may be preemptively stopped or deleted by Compute Engine if the capacity is needed | `bool` | `false` | no | -| [startup_script](#input_startup_script) | A startup script that runs during the boot cycle when you first launch an instance | `string` | `null` | no | -| [subnetwork](#input_subnetwork) | Name of the subnetwork to attach a network interface to | `string` | n/a | yes | -| [tags](#input_tags) | Tags to attach to the instance running Atlantis | `list(string)` | `[]` | no | -| [zone](#input_zone) | The zone that instances should be created in | `string` | n/a | yes | +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [block\_project\_ssh\_keys\_enabled](#input\_block\_project\_ssh\_keys\_enabled) | Blocks the use of project-wide publich SSH keys | `bool` | `false` | no | +| [disk\_kms\_key\_self\_link](#input\_disk\_kms\_key\_self\_link) | The self link of the encryption key that is stored in Google Cloud KMS | `string` | `null` | no | +| [domain](#input\_domain) | Domain to associate Atlantis with and to request a managed SSL certificate for. Without `https://` | `string` | n/a | yes | +| [env\_vars](#input\_env\_vars) | Key-value pairs representing environment variables and their respective values | `map(any)` | n/a | yes | +| [iap](#input\_iap) | Settings for enabling Cloud Identity Aware Proxy to protect the Atlantis UI |
object({
oauth2_client_id = string
oauth2_client_secret = string
})
| `null` | no | +| [image](#input\_image) | Docker image. This is most often a reference to a container located in a container registry | `string` | `"ghcr.io/runatlantis/atlantis:latest"` | no | +| [machine\_type](#input\_machine\_type) | The machine type to run Atlantis on | `string` | `"n2-standard-2"` | no | +| [name](#input\_name) | Custom name that's used during resource creation | `string` | n/a | yes | +| [network](#input\_network) | Name of the network | `string` | n/a | yes | +| [persistent\_disk\_size\_gb](#input\_persistent\_disk\_size\_gb) | The size of the persistent disk that Atlantis uses to store its data on | `number` | `50` | no | +| [project](#input\_project) | The ID of the project in which the resource belongs | `string` | `null` | no | +| [region](#input\_region) | The region that resources should be created in | `string` | n/a | yes | +| [service\_account](#input\_service\_account) | Service account to attach to the instance running Atlantis |
object({
email = string,
scopes = list(string)
})
|
{
"email": "",
"scopes": [
"cloud-platform"
]
}
| no | +| [spot\_machine\_enabled](#input\_spot\_machine\_enabled) | A Spot VM is discounted Compute Engine capacity that may be preemptively stopped or deleted by Compute Engine if the capacity is needed | `bool` | `false` | no | +| [startup\_script](#input\_startup\_script) | A startup script that runs during the boot cycle when you first launch an instance | `string` | `null` | no | +| [subnetwork](#input\_subnetwork) | Name of the subnetwork to attach a network interface to | `string` | n/a | yes | +| [tags](#input\_tags) | Tags to attach to the instance running Atlantis | `list(string)` | `[]` | no | +| [zone](#input\_zone) | The zone that instances should be created in | `string` | n/a | yes | ## Outputs -| Name | Description | -| ----------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------ | -| [cos_image_id](#output_cos_image_id) | The unique identifier for the Container-Optimized OS image used to create the Compute Engine instance. | -| [ip_address](#output_ip_address) | The IPv4 address of the load balancer | -| [managed_ssl_certificate_certificate_id](#output_managed_ssl_certificate_certificate_id) | The unique identifier for the Google Managed SSL certificate | -| [managed_ssl_certificate_expire_time](#output_managed_ssl_certificate_expire_time) | Expire time of the Google Managed SSL certificate | - +| Name | Description | +|------|-------------| +| [cos\_image\_id](#output\_cos\_image\_id) | The unique identifier of the Container-Optimized OS image used to create the Compute Engine instance. | +| [ip\_address](#output\_ip\_address) | The IPv4 address of the load balancer | +| [managed\_ssl\_certificate\_certificate\_id](#output\_managed\_ssl\_certificate\_certificate\_id) | The unique identifier of the Google Managed SSL certificate | +| [managed\_ssl\_certificate\_expire\_time](#output\_managed\_ssl\_certificate\_expire\_time) | Expire time of the Google Managed SSL certificate | diff --git a/versions.tf b/versions.tf index 19e860b..64b8914 100644 --- a/versions.tf +++ b/versions.tf @@ -10,5 +10,9 @@ terraform { source = "hashicorp/cloudinit" version = ">=2.2.0" } + random = { + source = "hashicorp/random" + version = ">=3.4.3" + } } }