diff --git a/README.md b/README.md index fd26b18..4535447 100644 --- a/README.md +++ b/README.md @@ -105,7 +105,7 @@ Examples codified under the [`examples`](./examples) are intended to give users | [api\_vpce\_security\_group\_ids](#input\_api\_vpce\_security\_group\_ids) | IDs of security groups to attach to API endpoint | `list(string)` | `[]` | no | | [api\_vpce\_subnet\_ids](#input\_api\_vpce\_subnet\_ids) | IDs of subnets to associate with API endpoint | `list(string)` | `[]` | no | | [api\_vpce\_tags](#input\_api\_vpce\_tags) | A map of tags to apply to the API endpoint | `map(string)` | `{}` | no | -| [bucket\_attach\_deny\_insecure\_transport\_policy](#input\_bucket\_attach\_deny\_insecure\_transport\_policy) | Controls if S3 bucket should have deny non-SSL transport policy attacheds | `bool` | `false` | no | +| [bucket\_attach\_deny\_insecure\_transport\_policy](#input\_bucket\_attach\_deny\_insecure\_transport\_policy) | Controls if S3 bucket should have deny non-SSL transport policy attacheds | `bool` | `true` | no | | [bucket\_name](#input\_bucket\_name) | Lambda artifact S3 bucket name | `string` | `""` | no | | [create\_agent\_vpce](#input\_create\_agent\_vpce) | Controls whether an agent endpoint should be created | `bool` | `false` | no | | [create\_api\_vpce](#input\_create\_api\_vpce) | Controls whether a API endpoint should be created | `bool` | `false` | no | diff --git a/examples/complete/README.md b/examples/complete/README.md index b2cd545..9d4e320 100644 --- a/examples/complete/README.md +++ b/examples/complete/README.md @@ -38,11 +38,11 @@ Note that this example may create resources which will incur monetary charges on | Name | Source | Version | |------|--------|---------| | [default](#module\_default) | ../../ | n/a | -| [log\_bucket\_1](#module\_log\_bucket\_1) | terraform-aws-modules/s3-bucket/aws | ~> 2 | -| [log\_bucket\_2](#module\_log\_bucket\_2) | terraform-aws-modules/s3-bucket/aws | ~> 2 | -| [security\_group](#module\_security\_group) | terraform-aws-modules/security-group/aws | ~> 4 | -| [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3 | -| [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 3.2 | +| [log\_bucket\_1](#module\_log\_bucket\_1) | terraform-aws-modules/s3-bucket/aws | ~> 2.0 | +| [log\_bucket\_2](#module\_log\_bucket\_2) | terraform-aws-modules/s3-bucket/aws | ~> 2.0 | +| [security\_group](#module\_security\_group) | terraform-aws-modules/security-group/aws | ~> 4.0 | +| [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 3.0 | +| [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 3.0 | ## Resources diff --git a/examples/complete/main.tf b/examples/complete/main.tf index b7d02ef..05ee3c0 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -65,7 +65,7 @@ resource "aws_kms_alias" "datadog" { module "vpc" { source = "terraform-aws-modules/vpc/aws" - version = "~> 3" + version = "~> 3.0" name = local.name cidr = "10.0.0.0/16" @@ -98,7 +98,7 @@ module "vpc" { module "vpc_endpoints" { source = "terraform-aws-modules/vpc/aws//modules/vpc-endpoints" - version = "~> 3.2" + version = "~> 3.0" vpc_id = module.vpc.vpc_id security_group_ids = [module.security_group.security_group_id] @@ -119,7 +119,7 @@ module "vpc_endpoints" { module "security_group" { source = "terraform-aws-modules/security-group/aws" - version = "~> 4" + version = "~> 4.0" name = local.name description = "Example security group" @@ -150,7 +150,7 @@ module "security_group" { module "log_bucket_1" { source = "terraform-aws-modules/s3-bucket/aws" - version = "~> 2" + version = "~> 2.0" bucket = "logs-1-${random_pet.this.id}" force_destroy = true @@ -177,7 +177,7 @@ module "log_bucket_1" { module "log_bucket_2" { source = "terraform-aws-modules/s3-bucket/aws" - version = "~> 2" + version = "~> 2.0" bucket = "logs-2-${random_pet.this.id}" force_destroy = true diff --git a/modules/log_forwarder/README.md b/modules/log_forwarder/README.md index bef4562..08bd365 100644 --- a/modules/log_forwarder/README.md +++ b/modules/log_forwarder/README.md @@ -55,7 +55,7 @@ module "datadog_log_forwarder" { | Name | Source | Version | |------|--------|---------| -| [this\_s3\_bucket](#module\_this\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | v2.6.0 | +| [this\_s3\_bucket](#module\_this\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | v2.10.0 | ## Resources diff --git a/modules/log_forwarder/main.tf b/modules/log_forwarder/main.tf index f23edda..43fc9e9 100644 --- a/modules/log_forwarder/main.tf +++ b/modules/log_forwarder/main.tf @@ -24,7 +24,7 @@ data "aws_region" "current" {} module "this_s3_bucket" { source = "terraform-aws-modules/s3-bucket/aws" - version = "v2.6.0" + version = "v2.10.0" create_bucket = var.create && var.create_bucket bucket = local.bucket_name diff --git a/variables.tf b/variables.tf index 6b87203..0a645ab 100644 --- a/variables.tf +++ b/variables.tf @@ -50,7 +50,7 @@ variable "bucket_name" { variable "bucket_attach_deny_insecure_transport_policy" { description = "Controls if S3 bucket should have deny non-SSL transport policy attacheds" type = bool - default = false + default = true } # Log Forwarder S3 Objcet