Skip to content

Commit

Permalink
Merge pull request #2 from chianw/branch5713
Browse files Browse the repository at this point in the history
Update terraform-azurerm-caf to 5.7.13
  • Loading branch information
arnaudlh authored Aug 16, 2024
2 parents bf73a36 + 7ba198d commit 0dd319d
Show file tree
Hide file tree
Showing 5 changed files with 9 additions and 54 deletions.
55 changes: 5 additions & 50 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,54 +1,9 @@
[![landingzones](https://github.com/Azure/caf-terraform-landingzones/actions/workflows/landingzones-tf100.yml/badge.svg)](https://github.com/Azure/caf-terraform-landingzones/actions/workflows/landingzones-tf100.yml)
***Warning: Important information for customers using azure/caf-terraform-landingzones***

[![Gitter](https://badges.gitter.im/aztfmod/community.svg)](https://gitter.im/aztfmod/community?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge)
This solution, offered by the Open-Source community, will no longer receive contributions from Microsoft.

# Azure Terraform SRE
Customers are encouraged to transition to Microsoft Azure Verified Modules (https://aka.ms/avm) for continued support and updates from Microsoft.

Please note, this repository is scheduled for decommissioning and will be removed on July 1, 2025.

Azure Terraform SRE (formely CAF Terraform) ambitions:

* Equip the Site Reliability Engineering teams for Terraform on Azure.
* Democratize an IaC: Infrastructure-as-Configuration.
* Commoditize state management and enterprise-wide composition.
* Standardize deployments leveraging official Azure landing zones components.
* Propose a prescriptive guidance on how to enable DevOps for infrastructure as code on Microsoft Azure.
* Foster a community of Azure *Terraformers* using a common set of practices and sharing best practices.


You can review the different components parts of the Azure Terraform SRE and look at the quick intro video below:

[![caf_elements](./_pictures/caf_elements.png)](https://www.youtube.com/watch?v=FlQ17u4NNts "CAF Introduction")


## :rocket: Getting started

When starting an enterprise deployment, we recommend you start creating a configuration repository where you craft the configuration files for your environments.

The best way to start is to clone the [platform starter repository](https://github.com/Azure/caf-terraform-landingzones-platform-starter) and getting started with the configuration files.

If you are reading this, you are probably interested also in reading the doc as below:
:books: Read our [centralized documentation page](https://aka.ms/caf/terraform)

## Community

Feel free to open an issue for feature or bug, or to submit a PR.

In case you have any question, you can reach out to tf-landingzones at microsoft dot com.

You can also reach us on [Gitter](https://gitter.im/aztfmod/community?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge)

## Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a
Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us
the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide
a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions
provided by the bot. You will only need to do this once across all repos using our CLA.

## Code of conduct

This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or
contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
Customers interested in maintaining their use of this community solution should refer to (https://github.com/aztfmod/caf-terraform-landingzones/issues/1)
2 changes: 1 addition & 1 deletion caf_launchpad/dynamic_secrets.tf
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

module "dynamic_keyvault_secrets" {
source = "aztfmod/caf/azurerm//modules/security/dynamic_keyvault_secrets"
version = "5.7.11"
version = "5.7.13"

for_each = try(var.dynamic_keyvault_secrets, {})

Expand Down
2 changes: 1 addition & 1 deletion caf_launchpad/landingzone.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "launchpad" {
source = "aztfmod/caf/azurerm"
version = "5.7.11"
version = "5.7.13"
# source = "git::https://github.com/aztfmod/terraform-azurerm-caf.git?ref=main"

providers = {
Expand Down
2 changes: 1 addition & 1 deletion caf_solution/dynamic_secrets.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "dynamic_keyvault_secrets" {
source = "aztfmod/caf/azurerm//modules/security/dynamic_keyvault_secrets"
version = "5.7.11"
version = "5.7.13"

for_each = {
for keyvault_key, secrets in try(var.dynamic_keyvault_secrets, {}) : keyvault_key => {
Expand Down
2 changes: 1 addition & 1 deletion caf_solution/landingzone.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "solution" {
source = "aztfmod/caf/azurerm"
version = "5.7.11"
version = "5.7.13"
# source = "git::https://github.com/aztfmod/terraform-azurerm-caf.git?ref=main"

providers = {
Expand Down

0 comments on commit 0dd319d

Please sign in to comment.