Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump secure_s3_bucket::terraform-aws-s3 from 0.14.0 to 2.0.0 #27

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jan 15, 2024

Bumps secure_s3_bucket::terraform-aws-s3 from 0.14.0 to 2.0.0.

Release notes

Sourced from secure_s3_bucket::terraform-aws-s3's releases.

2.0.0

✨ New Features

🐛 Bug Fixes

Use new terraform latest version

No release notes provided.

Update module

aws_tf version 4.2.0

new aws_tf version 4.2.0 supported.

Upgrade module to terraform 0.15

New Features

  • Upgrade module to terraform 0.15
  • Upgrade pre-commit to the latest
Changelog

Sourced from secure_s3_bucket::terraform-aws-s3's changelog.

Changelog

All notable changes to this project will be documented in this file.

The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.

[2.0.0] - 2023-10-03

✨ New Features

🐛 Bug Fixes

[1.3.0] - 2023-01-18

🐛 Bug Fixes

[0.15.2] - 2022-06-27

🐛 Bug Fixes

  • b406895 - use terraform letast version

[0.15.1] - 2022-06-27

✨ New Features

🐛 Bug Fixes

[0.12.2.1] - 2022-01-05

[0.12.7.4] - 2021-09-08

[0.12.8.1] - 2021-09-06

[0.12.7.3] - 2021-09-06

[0.12.7.2] - 2021-09-06

🐛 Bug Fixes

... (truncated)

Commits
  • 3d04665 Bump clouddrove/github-actions from 9.0.2 to 9.0.3 (#49)
  • f87bd40 Merge pull request #48 from clouddrove/fix/comments
  • 7fd25eb fix: Update Workflow tags
  • 5f3016f fix: Standardize Comments
  • d6406d7 feat: add bucket_policy resource and mfa_delete Argument (#46)
  • 9727c0c update terraform latest version and fix naming issue (#44)
  • 6031ee9 Bump clouddrove/kms/aws in /_example/logging-encryption-s3 (#43)
  • b59b6e1 update README.md
  • b65024f Bump clouddrove/kms/aws from 1.3.0 to 1.3.1 in /_example/complete (#41)
  • 787a2a7 Bump clouddrove/kms/aws from 1.3.0 to 1.3.1 in /_example/encryption-s3 (#42)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [secure_s3_bucket::terraform-aws-s3](https://github.com/clouddrove/terraform-aws-s3) from 0.14.0 to 2.0.0.
- [Release notes](https://github.com/clouddrove/terraform-aws-s3/releases)
- [Changelog](https://github.com/clouddrove/terraform-aws-s3/blob/master/CHANGELOG.md)
- [Commits](clouddrove/terraform-aws-s3@tags/0.14.0...tags/2.0.0)

---
updated-dependencies:
- dependency-name: secure_s3_bucket::github::clouddrove/terraform-aws-s3::tags/0.14.0
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jan 15, 2024
@dependabot dependabot bot requested a review from a team January 15, 2024 14:28
@dependabot dependabot bot added the terraform Pull requests that update Terraform code label Jan 15, 2024
Copy link
Contributor Author

dependabot bot commented on behalf of github Jan 15, 2024

Dependabot tried to add @approvers as a reviewer to this PR, but received the following error from GitHub:

POST https://api.github.com/repos/clouddrove/terraform-aws-cloudtrail-baseline/pulls/27/requested_reviewers: 422 - Reviews may only be requested from collaborators. One or more of the users or teams you specified is not a collaborator of the clouddrove/terraform-aws-cloudtrail-baseline repository. // See: https://docs.github.com/rest/pulls/review-requests#request-reviewers-for-a-pull-request

@anmolnagpal
Copy link
Contributor

Terraform Security Scan Failed

Show Output
Result #1 LOW Log group is not encrypted. 
────────────────────────────────────────────────────────────────────────────────
  main.tf:80-85
────────────────────────────────────────────────────────────────────────────────
   80    resource "aws_cloudwatch_log_group" "cloudtrail_events" {
   81      count             = var.enabled ? 1 : 0
   82      name              = var.cloudwatch_logs_group_name
   83      retention_in_days = var.cloudwatch_logs_retention_in_days
   84      tags              = module.labels.tags
   85    }
────────────────────────────────────────────────────────────────────────────────
          ID aws-cloudwatch-log-group-customer-key
      Impact Log data may be leaked if the logs are compromised. No auditing of who have viewed the logs.
  Resolution Enable CMK encryption of CloudWatch Log Groups

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/aws/cloudwatch/log-group-customer-key/
  - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group#kms_key_id
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             205.902µs
  parsing              6.418135ms
  adaptation           216.002µs
  checks               17.901893ms
  total                24.741932ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    1
  blocks processed     56
  files read           4

  results
  ──────────────────────────────────────────
  passed               0
  ignored              0
  critical             0
  high                 0
  medium               0
  low                  1

  1 potential problem(s) detected.

@anmolnagpal anmolnagpal merged commit d81bbe1 into master Jan 15, 2024
14 of 20 checks passed
@anmolnagpal anmolnagpal deleted the dependabot/terraform/secure_s3_bucket--github--clouddrove/terraform-aws-s3--tags/0.14.0-2.0.0 branch January 15, 2024 14:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file terraform Pull requests that update Terraform code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants