@@ -143,7 +143,7 @@ resource "aws_ssm_parameter" "atlantis_bitbucket_user_token" {
143
143
# ##################
144
144
module "vpc" {
145
145
source = " terraform-aws-modules/vpc/aws"
146
- version = " v2.5 .0"
146
+ version = " v2.33 .0"
147
147
148
148
create_vpc = var. vpc_id == " "
149
149
@@ -220,7 +220,7 @@ module "alb" {
220
220
# ##################
221
221
module "alb_https_sg" {
222
222
source = " terraform-aws-modules/security-group/aws//modules/https-443"
223
- version = " v3.0.1 "
223
+ version = " v3.9.0 "
224
224
225
225
name = " ${ var . name } -alb-https"
226
226
vpc_id = local. vpc_id
@@ -233,7 +233,7 @@ module "alb_https_sg" {
233
233
234
234
module "alb_http_sg" {
235
235
source = " terraform-aws-modules/security-group/aws//modules/http-80"
236
- version = " v3.0.1 "
236
+ version = " v3.9.0 "
237
237
238
238
name = " ${ var . name } -alb-http"
239
239
vpc_id = local. vpc_id
@@ -246,13 +246,13 @@ module "alb_http_sg" {
246
246
247
247
module "atlantis_sg" {
248
248
source = " terraform-aws-modules/security-group/aws"
249
- version = " v3.0.1 "
249
+ version = " v3.9.0 "
250
250
251
251
name = var. name
252
252
vpc_id = local. vpc_id
253
253
description = " Security group with open port for Atlantis (${ var . atlantis_port } ) from ALB, egress ports are all world open"
254
254
255
- computed_ingress_with_source_security_group_id = [
255
+ ingress_with_source_security_group_id = [
256
256
{
257
257
from_port = var.atlantis_port
258
258
to_port = var.atlantis_port
@@ -262,8 +262,6 @@ module "atlantis_sg" {
262
262
},
263
263
]
264
264
265
- number_of_computed_ingress_with_source_security_group_id = 1
266
-
267
265
egress_rules = [" all-all" ]
268
266
269
267
tags = local. tags
@@ -274,7 +272,7 @@ module "atlantis_sg" {
274
272
# ##################
275
273
module "acm" {
276
274
source = " terraform-aws-modules/acm/aws"
277
- version = " v2.4 .0"
275
+ version = " v2.5 .0"
278
276
279
277
create_certificate = var. certificate_arn == " "
280
278
0 commit comments