瀏覽代碼

Update to TF 0.14

Latest 0.14 release. First stop on the road to 0.15.

To ensure compatibility, please also upgrade terragrunt to 0.29.1

* Updates .tfswitch.toml to specify 0.14.11
* Sets global versions in root terragrunt.hcl
* Removes versioning from submodules
* Removes required_version from modules (there can be only one)
* Checks in initial version lock files in test
* Adds skip_tls_verify for Vault and updates readme
Fred Damstra [afs macbook] 4 年之前
父節點
當前提交
a6c4d41939
共有 100 個文件被更改,包括 1630 次插入85 次删除
  1. 1 1
      .tfswitch.toml
  2. 0 2
      000-skeleton/005-iam/terragrunt.hcl
  3. 0 1
      000-skeleton/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  4. 9 8
      bin/terragrunt-apply-all
  5. 0 1
      common/aws-us-gov/afs-mdr-common-services-gov/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  6. 0 2
      common/aws-us-gov/afs-mdr-common-services-gov/080-codebuild-ecr-sample/terragrunt.hcl
  7. 0 2
      common/aws-us-gov/afs-mdr-common-services-gov/081-codebuild-rpm-collectd/terragrunt.hcl
  8. 0 2
      common/aws-us-gov/afs-mdr-common-services-gov/085-codebuild-ecr-customer-portal/terragrunt.hcl
  9. 0 2
      common/aws-us-gov/afs-mdr-common-services-gov/090-codebuild-rpm-tmux/terragrunt.hcl
  10. 0 2
      common/aws-us-gov/afs-mdr-common-services-gov/095-codebuild-rpm-aws-efs-utils/terragrunt.hcl
  11. 0 2
      common/aws-us-gov/afs-mdr-common-services-gov/100-codebuild-rpm-syslog-ng/terragrunt.hcl
  12. 0 2
      common/aws-us-gov/afs-mdr-common-services-gov/105-codebuild-ecr-mcas-container/terragrunt.hcl
  13. 0 1
      common/aws/legacy-mdr-root/006-account-standards-regional/us-west-1/terragrunt.hcl
  14. 0 1
      common/aws/mdr-common-services/006-account-standards-regional/us-west-1/terragrunt.hcl
  15. 0 1
      common/aws/mdr-cyber-range/006-account-standards-regional/us-west-1/terragrunt.hcl
  16. 0 2
      prod/aws-us-gov/mdr-prod-bas/005-iam/terragrunt.hcl
  17. 0 1
      prod/aws-us-gov/mdr-prod-bas/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  18. 0 1
      prod/aws-us-gov/mdr-prod-c2/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  19. 0 1
      prod/aws-us-gov/mdr-prod-c2/090-instance-mailrelay/terragrunt.hcl
  20. 13 0
      prod/aws-us-gov/mdr-prod-c2/090-instance-vault/README.md
  21. 6 0
      prod/aws-us-gov/mdr-prod-c2/096-sensu-configuration/README.md
  22. 0 8
      prod/aws-us-gov/mdr-prod-c2/096-sensu-configuration/terragrunt.hcl
  23. 1 1
      prod/aws-us-gov/mdr-prod-c2/099-vault-configuration/terragrunt.hcl
  24. 1 0
      prod/aws-us-gov/mdr-prod-c2/160-splunk-indexer-cluster/.tfswitch.toml
  25. 0 1
      prod/aws-us-gov/mdr-prod-c2/165-splunk-legacy-hec/terragrunt.hcl
  26. 0 2
      prod/aws-us-gov/mdr-prod-ca-c19/005-iam/terragrunt.hcl
  27. 0 1
      prod/aws-us-gov/mdr-prod-ca-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  28. 0 2
      prod/aws-us-gov/mdr-prod-doed/005-iam/terragrunt.hcl
  29. 0 1
      prod/aws-us-gov/mdr-prod-doed/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  30. 0 2
      prod/aws-us-gov/mdr-prod-frtib/005-iam/terragrunt.hcl
  31. 0 1
      prod/aws-us-gov/mdr-prod-frtib/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  32. 0 1
      prod/aws-us-gov/mdr-prod-modelclient/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  33. 0 2
      prod/aws-us-gov/mdr-prod-nihors/005-iam/terragrunt.hcl
  34. 0 1
      prod/aws-us-gov/mdr-prod-nihors/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  35. 0 1
      prod/aws/mdr-prod-c2/006-account-standards-regional/us-west-1/terragrunt.hcl
  36. 0 2
      prod/aws/mdr-prod-ca-c19/005-iam/terragrunt.hcl
  37. 0 1
      prod/aws/mdr-prod-ca-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  38. 0 2
      prod/aws/mdr-prod-doed/005-iam/terragrunt.hcl
  39. 0 1
      prod/aws/mdr-prod-doed/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  40. 0 2
      prod/aws/mdr-prod-frtib/005-iam/terragrunt.hcl
  41. 0 1
      prod/aws/mdr-prod-frtib/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  42. 21 5
      terragrunt.hcl
  43. 26 0
      test/aws-us-gov/mdr-test-c2/005-account-standards-c2/.terraform.lock.hcl
  44. 26 0
      test/aws-us-gov/mdr-test-c2/005-iam/.terraform.lock.hcl
  45. 9 0
      test/aws-us-gov/mdr-test-c2/006-account-standards-regional/us-gov-west-1/.terraform.lock.hcl
  46. 0 1
      test/aws-us-gov/mdr-test-c2/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  47. 33 0
      test/aws-us-gov/mdr-test-c2/006-account-standards/.terraform.lock.hcl
  48. 26 0
      test/aws-us-gov/mdr-test-c2/007-aws-scheduler/.terraform.lock.hcl
  49. 26 0
      test/aws-us-gov/mdr-test-c2/008-transit-gateway-hub/.terraform.lock.hcl
  50. 26 0
      test/aws-us-gov/mdr-test-c2/010-vpc-access/.terraform.lock.hcl
  51. 26 0
      test/aws-us-gov/mdr-test-c2/010-vpc-portal/.terraform.lock.hcl
  52. 26 0
      test/aws-us-gov/mdr-test-c2/010-vpc-private-services/.terraform.lock.hcl
  53. 26 0
      test/aws-us-gov/mdr-test-c2/010-vpc-public/.terraform.lock.hcl
  54. 26 0
      test/aws-us-gov/mdr-test-c2/010-vpc-splunk/.terraform.lock.hcl
  55. 26 0
      test/aws-us-gov/mdr-test-c2/010-vpc-system-services/.terraform.lock.hcl
  56. 26 0
      test/aws-us-gov/mdr-test-c2/011-private-dns-zone/.terraform.lock.hcl
  57. 18 0
      test/aws-us-gov/mdr-test-c2/015-security-vpc-interconnects/.terraform.lock.hcl
  58. 18 0
      test/aws-us-gov/mdr-test-c2/018-interconnect-instances/.terraform.lock.hcl
  59. 18 0
      test/aws-us-gov/mdr-test-c2/019-attach-transit-gateway-to-hub-account/.terraform.lock.hcl
  60. 26 0
      test/aws-us-gov/mdr-test-c2/020-transit-gateway-interconnect-vpn/.terraform.lock.hcl
  61. 26 0
      test/aws-us-gov/mdr-test-c2/021-qualys-connector-role/.terraform.lock.hcl
  62. 26 0
      test/aws-us-gov/mdr-test-c2/023-dns-resolver-instance-2/.terraform.lock.hcl
  63. 26 0
      test/aws-us-gov/mdr-test-c2/023-dns-resolver-instance/.terraform.lock.hcl
  64. 34 0
      test/aws-us-gov/mdr-test-c2/030-qualys-vpc/.terraform.lock.hcl
  65. 34 0
      test/aws-us-gov/mdr-test-c2/031-attach-qualys-vpc-to-transit-gateway/.terraform.lock.hcl
  66. 34 0
      test/aws-us-gov/mdr-test-c2/070-instance-bastion/.terraform.lock.hcl
  67. 34 0
      test/aws-us-gov/mdr-test-c2/071-instance-salt-master/.terraform.lock.hcl
  68. 34 0
      test/aws-us-gov/mdr-test-c2/072-salt-master-inventory-role/.terraform.lock.hcl
  69. 34 0
      test/aws-us-gov/mdr-test-c2/080-instance-proxy-server/.terraform.lock.hcl
  70. 34 0
      test/aws-us-gov/mdr-test-c2/080-instance-repo-server/.terraform.lock.hcl
  71. 34 0
      test/aws-us-gov/mdr-test-c2/090-instance-github/.terraform.lock.hcl
  72. 34 0
      test/aws-us-gov/mdr-test-c2/090-instance-keycloak/.terraform.lock.hcl
  73. 34 0
      test/aws-us-gov/mdr-test-c2/090-instance-mailrelay/.terraform.lock.hcl
  74. 0 1
      test/aws-us-gov/mdr-test-c2/090-instance-mailrelay/terragrunt.hcl
  75. 34 0
      test/aws-us-gov/mdr-test-c2/090-instance-openvpn/.terraform.lock.hcl
  76. 34 0
      test/aws-us-gov/mdr-test-c2/090-instance-teleport/.terraform.lock.hcl
  77. 34 0
      test/aws-us-gov/mdr-test-c2/090-instance-vault/.terraform.lock.hcl
  78. 34 0
      test/aws-us-gov/mdr-test-c2/095-instance-sensu/.terraform.lock.hcl
  79. 34 0
      test/aws-us-gov/mdr-test-c2/096-sensu-configuration/.terraform.lock.hcl
  80. 1 0
      test/aws-us-gov/mdr-test-c2/096-sensu-configuration/README.md
  81. 0 8
      test/aws-us-gov/mdr-test-c2/096-sensu-configuration/terragrunt.hcl
  82. 34 0
      test/aws-us-gov/mdr-test-c2/099-vault-configuration/.terraform.lock.hcl
  83. 1 1
      test/aws-us-gov/mdr-test-c2/099-vault-configuration/terragrunt.hcl
  84. 34 0
      test/aws-us-gov/mdr-test-c2/140-splunk-frozen-bucket/.terraform.lock.hcl
  85. 34 0
      test/aws-us-gov/mdr-test-c2/150-splunk-cluster-master/.terraform.lock.hcl
  86. 34 0
      test/aws-us-gov/mdr-test-c2/160-splunk-indexer-cluster/.terraform.lock.hcl
  87. 34 0
      test/aws-us-gov/mdr-test-c2/165-splunk-legacy-hec/.terraform.lock.hcl
  88. 0 1
      test/aws-us-gov/mdr-test-c2/165-splunk-legacy-hec/terragrunt.hcl
  89. 34 0
      test/aws-us-gov/mdr-test-c2/170-splunk-searchhead/.terraform.lock.hcl
  90. 34 0
      test/aws-us-gov/mdr-test-c2/175-splunk-alsi/.terraform.lock.hcl
  91. 34 0
      test/aws-us-gov/mdr-test-c2/180-splunk-heavy-forwarder/.terraform.lock.hcl
  92. 34 0
      test/aws-us-gov/mdr-test-c2/190-splunk-fm-shared-search/.terraform.lock.hcl
  93. 34 0
      test/aws-us-gov/mdr-test-c2/190-splunk-mc/.terraform.lock.hcl
  94. 34 0
      test/aws-us-gov/mdr-test-c2/190-splunk-qcompliance-searchhead/.terraform.lock.hcl
  95. 34 0
      test/aws-us-gov/mdr-test-c2/200-customer-portal/.terraform.lock.hcl
  96. 34 0
      test/aws-us-gov/mdr-test-c2/205-customer-portal-lambda/.terraform.lock.hcl
  97. 34 0
      test/aws-us-gov/mdr-test-c2/250-phantom/.terraform.lock.hcl
  98. 34 0
      test/aws-us-gov/mdr-test-c2/270-nessus-security-center/.terraform.lock.hcl
  99. 34 0
      test/aws-us-gov/mdr-test-c2/275-nessus-security-scanners/.terraform.lock.hcl
  100. 36 0
      test/aws-us-gov/mdr-test-malware/005-iam/.terraform.lock.hcl

+ 1 - 1
.tfswitch.toml

@@ -1 +1 @@
-version = "0.13.7"
+version = "0.14.11"

+ 0 - 2
000-skeleton/005-iam/terragrunt.hcl

@@ -23,11 +23,9 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "template" {
-  version = "~> 2.1"
 }
 
 provider "aws" {
-  version = "~> 3.0"
   region = "${local.aws_region}"
 
   # TODO: make sure you have a profile matching this

+ 0 - 1
000-skeleton/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 9 - 8
bin/terragrunt-apply-all

@@ -64,14 +64,15 @@ function argparse {
   else
     if [[ $NOTLOCAL ]]; then
       [[ $DEBUG == 1 ]] && >&2 echo debug: Not local specified, not prompting.
-    else
-      read -p "Local not specified. Specify '--notlocal' to skip this question. Are you sure? [Y/n]? " -n 1 -r
-      echo ""
-      if [[ $REPLY =~ ^[Nn]$ ]]
-      then
-          echo Exiting...
-          exit 1
-      fi
+# # This turned out to be annoying, I _usually_ run it with --notlocal
+#    else
+#      read -p "Local not specified. Specify '--notlocal' to skip this question. Are you sure? [Y/n]? " -n 1 -r
+#      echo ""
+#      if [[ $REPLY =~ ^[Nn]$ ]]
+#      then
+#          echo Exiting...
+#          exit 1
+#      fi
     fi
     TERRAGRUNT_BIN=`which terragrunt`
   fi

+ 0 - 1
common/aws-us-gov/afs-mdr-common-services-gov/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 2
common/aws-us-gov/afs-mdr-common-services-gov/080-codebuild-ecr-sample/terragrunt.hcl

@@ -35,13 +35,11 @@ terraform {
 }
 #Provider block for Github engineering. 
 provider "github" {
-  version      = "~> 4.2.0"
   organization = "mdr-engineering"
   base_url     = "https://github.xdr.accenturefederalcyber.com/"
 }
 #Provider block for Github MDR Content. 
 #provider "github" {
-#  version      = "~> 4.1.0"
 #  organization = "MDR-Content"
 #  base_url     = "https://github.xdr.accenturefederalcyber.com/"
 #}

+ 0 - 2
common/aws-us-gov/afs-mdr-common-services-gov/081-codebuild-rpm-collectd/terragrunt.hcl

@@ -35,13 +35,11 @@ terraform {
 }
 #Provider block for Github engineering. 
 provider "github" {
-  version      = "~> 4.2.0"
   organization = "mdr-engineering"
   base_url     = "https://github.xdr.accenturefederalcyber.com/"
 }
 #Provider block for Github MDR Content. 
 #provider "github" {
-#  version      = "~> 4.2.0"
 #  organization = "MDR-Content"
 #  base_url     = "https://github.xdr.accenturefederalcyber.com/"
 #}

+ 0 - 2
common/aws-us-gov/afs-mdr-common-services-gov/085-codebuild-ecr-customer-portal/terragrunt.hcl

@@ -35,13 +35,11 @@ terraform {
 }
 #Provider block for Github engineering. 
 #provider "github" {
-#  version      = "~> 4.2.0"
 #  organization = "mdr-engineering"
 #  base_url     = "https://github.xdr.accenturefederalcyber.com/"
 #}
 #Provider block for Github MDR Content. 
 provider "github" {
-  version      = "~> 4.2.0"
   organization = "MDR-Content"
   base_url     = "https://github.xdr.accenturefederalcyber.com/"
 }

+ 0 - 2
common/aws-us-gov/afs-mdr-common-services-gov/090-codebuild-rpm-tmux/terragrunt.hcl

@@ -35,13 +35,11 @@ terraform {
 }
 #Provider block for Github engineering. 
 provider "github" {
-  version      = "~> 4.2.0"
   organization = "mdr-engineering"
   base_url     = "https://github.xdr.accenturefederalcyber.com/"
 }
 #Provider block for Github MDR Content. 
 #provider "github" {
-#  version      = "~> 4.2.0"
 #  organization = "MDR-Content"
 #  base_url     = "https://github.xdr.accenturefederalcyber.com/"
 #}

+ 0 - 2
common/aws-us-gov/afs-mdr-common-services-gov/095-codebuild-rpm-aws-efs-utils/terragrunt.hcl

@@ -35,13 +35,11 @@ terraform {
 }
 #Provider block for Github engineering. 
 provider "github" {
-  version      = "~> 4.2.0"
   organization = "mdr-engineering"
   base_url     = "https://github.xdr.accenturefederalcyber.com/"
 }
 #Provider block for Github MDR Content. 
 #provider "github" {
-#  version      = "~> 4.2.0"
 #  organization = "MDR-Content"
 #  base_url     = "https://github.xdr.accenturefederalcyber.com/"
 #}

+ 0 - 2
common/aws-us-gov/afs-mdr-common-services-gov/100-codebuild-rpm-syslog-ng/terragrunt.hcl

@@ -35,13 +35,11 @@ terraform {
 }
 #Provider block for Github engineering. 
 provider "github" {
-  version      = "~> 4.2.0"
   organization = "mdr-engineering"
   base_url     = "https://github.xdr.accenturefederalcyber.com/"
 }
 #Provider block for Github MDR Content. 
 #provider "github" {
-#  version      = "~> 4.2.0"
 #  organization = "MDR-Content"
 #  base_url     = "https://github.xdr.accenturefederalcyber.com/"
 #}

+ 0 - 2
common/aws-us-gov/afs-mdr-common-services-gov/105-codebuild-ecr-mcas-container/terragrunt.hcl

@@ -35,13 +35,11 @@ terraform {
 }
 #Provider block for Github engineering. 
 provider "github" {
-  version      = "~> 4.2.0"
   organization = "mdr-engineering"
   base_url     = "https://github.xdr.accenturefederalcyber.com/"
 }
 #Provider block for Github MDR Content. 
 #provider "github" {
-#  version      = "~> 4.2.0"
 #  organization = "MDR-Content"
 #  base_url     = "https://github.xdr.accenturefederalcyber.com/"
 #}

+ 0 - 1
common/aws/legacy-mdr-root/006-account-standards-regional/us-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 1
common/aws/mdr-common-services/006-account-standards-regional/us-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 1
common/aws/mdr-cyber-range/006-account-standards-regional/us-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 2
prod/aws-us-gov/mdr-prod-bas/005-iam/terragrunt.hcl

@@ -23,11 +23,9 @@ locals {
 #  if_exists = "overwrite_terragrunt"
 #  contents  = <<EOF
 #provider "template" {
-#  version = "~> 2.1"
 #}
 
 #provider "aws" {
-#  version = "~> 3.0"
 #  region = "${local.aws_region}"
 #
 #  # TODO: make sure you have a profile matching this

+ 0 - 1
prod/aws-us-gov/mdr-prod-bas/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 1
prod/aws-us-gov/mdr-prod-c2/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 1
prod/aws-us-gov/mdr-prod-c2/090-instance-mailrelay/terragrunt.hcl

@@ -30,7 +30,6 @@ generate "provider-ses" {
   if_exists = "overwrite_terragrunt"
   contents = <<EOF
 provider "aws" {
-  version = "~> 3.0"
   region = "${local.region_vars.locals.ses_region}"
   allowed_account_ids = [ "${local.account_vars.locals.aws_account_id}" ]
   profile = "govcloud"

+ 13 - 0
prod/aws-us-gov/mdr-prod-c2/090-instance-vault/README.md

@@ -36,3 +36,16 @@ For additional Vault documentation see these locations:
 https://github.mdr.defpoint.com/mdr-engineering/infrastructure-notes/blob/master/Vault%20Notes.md
 
 https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/blob/develop/salt/fileroots/vault/README.md
+
+## To apply without putting your junk in the terragrunt.hcl
+
+THIS SECTION INCOMPLETE
+
+1. `VAULT_TOKEN`: Login to vault, and click your name dropdown, then copy secret. You'll need it more than once.
+1. `TF_VAR_okta_api_token`: Find this in the prod vault (even for test)
+1. `TF_VAR_okta_oidc_client_secret`: Find this in the prod vault (even for test)
+
+Then apply:
+```
+VAULT_TOKEN=<fromvault> TF_VAR_okta_api_token=YOURTOKENHERE TF_VAR_okta_oidc_client_secret=YOURSECRETHERE terragrunt apply
+```

+ 6 - 0
prod/aws-us-gov/mdr-prod-c2/096-sensu-configuration/README.md

@@ -12,3 +12,9 @@ If you are an idiot and add an ! to the password you can escape it like this:
 e!password
 
 `export SENSU_PASSWORD=e\!password`
+
+Or, in one line to apply:
+```
+SENSU_PASSWORD=blah terragrunt apply
+```
+

+ 0 - 8
prod/aws-us-gov/mdr-prod-c2/096-sensu-configuration/terragrunt.hcl

@@ -30,14 +30,6 @@ generate "sensu-provider" {
   path      = "sensu-provider.tf"
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
-terraform {
-  required_providers {
-    sensu = {
-      source = "jtopjian/sensu"
-      version = "0.10.5"
-    }
-  }
-}
 #Provider block for Sensu. 
 provider "sensu" {
   api_url   = "https://${dependency.instance-sensu.outputs.internal_alb_address}:8080"

+ 1 - 1
prod/aws-us-gov/mdr-prod-c2/099-vault-configuration/terragrunt.hcl

@@ -31,8 +31,8 @@ generate "vault-provider" {
   contents  = <<EOF
 #Provider block for Vault. 
 provider "vault" {
-  version = "~> 2.18.0"
   address = "https://${dependency.instance-vault.outputs.vault_alb_address}"
+  skip_tls_verify = true
 }
 EOF
 }

+ 1 - 0
prod/aws-us-gov/mdr-prod-c2/160-splunk-indexer-cluster/.tfswitch.toml

@@ -0,0 +1 @@
+../../../../.tfswitch.toml

+ 0 - 1
prod/aws-us-gov/mdr-prod-c2/165-splunk-legacy-hec/terragrunt.hcl

@@ -21,7 +21,6 @@ generate "provider-legacy" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 3.0"
   region = "us-east-1"
 
   assume_role {

+ 0 - 2
prod/aws-us-gov/mdr-prod-ca-c19/005-iam/terragrunt.hcl

@@ -23,11 +23,9 @@ locals {
 #  if_exists = "overwrite_terragrunt"
 #  contents  = <<EOF
 #provider "template" {
-#  version = "~> 2.1"
 #}
 
 #provider "aws" {
-#  version = "~> 3.0"
 #  region = "${local.aws_region}"
 #
 #  # TODO: make sure you have a profile matching this

+ 0 - 1
prod/aws-us-gov/mdr-prod-ca-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 2
prod/aws-us-gov/mdr-prod-doed/005-iam/terragrunt.hcl

@@ -23,11 +23,9 @@ locals {
 #   if_exists = "overwrite_terragrunt"
 #   contents  = <<EOF
 # provider "template" {
-#   version = "~> 2.1"
 # }
 
 # provider "aws" {
-#   version = "~> 3.0"
 #   region = "${local.aws_region}"
 
 #   # TODO: make sure you have a profile matching this

+ 0 - 1
prod/aws-us-gov/mdr-prod-doed/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 2
prod/aws-us-gov/mdr-prod-frtib/005-iam/terragrunt.hcl

@@ -23,11 +23,9 @@ locals {
 #   if_exists = "overwrite_terragrunt"
 #   contents  = <<EOF
 # provider "template" {
-#   version = "~> 2.1"
 # }
 
 # provider "aws" {
-#   version = "~> 3.0"
 #   region = "${local.aws_region}"
 
 #   # TODO: make sure you have a profile matching this

+ 0 - 1
prod/aws-us-gov/mdr-prod-frtib/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 1
prod/aws-us-gov/mdr-prod-modelclient/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 2
prod/aws-us-gov/mdr-prod-nihors/005-iam/terragrunt.hcl

@@ -24,11 +24,9 @@ locals {
 #  if_exists = "overwrite_terragrunt"
 #  contents  = <<EOF
 #provider "template" {
-#  version = "~> 2.1"
 #}
 #
 #provider "aws" {
-#  version = "~> 3.0"
 #  region = "${local.aws_region}"
 #
 #  # TODO: make sure you have a profile matching this

+ 0 - 1
prod/aws-us-gov/mdr-prod-nihors/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 1
prod/aws/mdr-prod-c2/006-account-standards-regional/us-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 2
prod/aws/mdr-prod-ca-c19/005-iam/terragrunt.hcl

@@ -23,11 +23,9 @@ locals {
 #  if_exists = "overwrite_terragrunt"
 #  contents  = <<EOF
 #provider "template" {
-#  version = "~> 2.1"
 #}
 
 #provider "aws" {
-#  version = "~> 3.0"
 #  region = "${local.aws_region}"
 #
 #  # TODO: make sure you have a profile matching this

+ 0 - 1
prod/aws/mdr-prod-ca-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 2
prod/aws/mdr-prod-doed/005-iam/terragrunt.hcl

@@ -23,11 +23,9 @@ locals {
 #   if_exists = "overwrite_terragrunt"
 #   contents  = <<EOF
 # provider "template" {
-#   version = "~> 2.1"
 # }
 
 # provider "aws" {
-#   version = "~> 3.0"
 #   region = "${local.aws_region}"
 
 #   # TODO: make sure you have a profile matching this

+ 0 - 1
prod/aws/mdr-prod-doed/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 0 - 2
prod/aws/mdr-prod-frtib/005-iam/terragrunt.hcl

@@ -23,11 +23,9 @@ locals {
 #   if_exists = "overwrite_terragrunt"
 #   contents  = <<EOF
 # provider "template" {
-#   version = "~> 2.1"
 # }
 
 # provider "aws" {
-#   version = "~> 3.0"
 #   region = "${local.aws_region}"
 
 #   # TODO: make sure you have a profile matching this

+ 0 - 1
prod/aws/mdr-prod-frtib/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 21 - 5
terragrunt.hcl

@@ -64,12 +64,31 @@ generate "provider" {
   path      = "provider.tf"
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
+terraform {
+  required_providers {
+    aws = {
+      source = "hashicorp/aws"
+      version = "= 3.37.0" # 2021-04-29: upgrade from 2.66
+    }
+    template = {
+      source = "hashicorp/template"
+      version = "= 2.2.0" # 2021-04-29: ugprade from 2.1.0
+    }
+    vault = {
+      source = "hashicorp/vault"
+      version = "= 2.19.1" # 2021-04-29: upgrade from 2.18.0
+    }
+    sensu = {
+      source = "jtopjian/sensu"
+      version = "= 0.10.5"
+    }
+  }
+}
+
 provider "template" {
-  version = "~> 2.1"
 }
 
 provider "aws" {
-  version = "~> 3.26"
   region = "${local.aws_region}"
 
   assume_role {
@@ -85,7 +104,6 @@ provider "aws" {
 
 # The "common" provider in the respective partition is always available
 provider "aws" {
-  version = "~> 3.26"
   region = "${local.aws_region}"
   allowed_account_ids = [ "471284459109", "701290387780" ]
   profile = "${local.common_profile}"
@@ -99,7 +117,6 @@ provider "aws" {
 
 # The "mdr-common-services-commercial" provider is used for public DNS entries
 provider "aws" {
-  version = "~> 3.26"
   region = "us-east-1"
   allowed_account_ids = [ "471284459109" ]
   profile = "commercial"
@@ -113,7 +130,6 @@ provider "aws" {
 
 # The "C2" provider, used for private DNS
 provider "aws" {
-  version = "~> 3.26"
   region = "us-gov-east-1"
   allowed_account_ids = [ "721817724804", "738800754746" ]
   profile = "govcloud"

+ 26 - 0
test/aws-us-gov/mdr-test-c2/005-account-standards-c2/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/005-iam/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 9 - 0
test/aws-us-gov/mdr-test-c2/006-account-standards-regional/us-gov-west-1/.terraform.lock.hcl

@@ -0,0 +1,9 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}

+ 0 - 1
test/aws-us-gov/mdr-test-c2/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -34,7 +34,6 @@ generate "provider" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 2.66"
   region = "${local.target_aws_region}"
 
   assume_role {

+ 33 - 0
test/aws-us-gov/mdr-test-c2/006-account-standards/.terraform.lock.hcl

@@ -0,0 +1,33 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/archive" {
+  version = "2.1.0"
+  hashes = [
+    "h1:Rjd4bHMA69V+16tiriAUTW8vvqoljzNLmEaRBCgzpUs=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/007-aws-scheduler/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/008-transit-gateway-hub/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/010-vpc-access/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = ">= 2.42.0, >= 2.70.0, 3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/010-vpc-portal/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = ">= 2.42.0, >= 2.70.0, 3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/010-vpc-private-services/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = ">= 2.42.0, >= 2.70.0, 3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/010-vpc-public/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = ">= 2.42.0, >= 2.70.0, 3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/010-vpc-splunk/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = ">= 2.42.0, >= 2.70.0, 3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/010-vpc-system-services/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = ">= 2.42.0, >= 2.70.0, 3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/011-private-dns-zone/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 18 - 0
test/aws-us-gov/mdr-test-c2/015-security-vpc-interconnects/.terraform.lock.hcl

@@ -0,0 +1,18 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = ">= 2.42.0, >= 2.70.0, 3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}

+ 18 - 0
test/aws-us-gov/mdr-test-c2/018-interconnect-instances/.terraform.lock.hcl

@@ -0,0 +1,18 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}

+ 18 - 0
test/aws-us-gov/mdr-test-c2/019-attach-transit-gateway-to-hub-account/.terraform.lock.hcl

@@ -0,0 +1,18 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/020-transit-gateway-interconnect-vpn/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/021-qualys-connector-role/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/023-dns-resolver-instance-2/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 26 - 0
test/aws-us-gov/mdr-test-c2/023-dns-resolver-instance/.terraform.lock.hcl

@@ -0,0 +1,26 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/030-qualys-vpc/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = ">= 2.42.0, >= 2.70.0, 3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/031-attach-qualys-vpc-to-transit-gateway/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/070-instance-bastion/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/071-instance-salt-master/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/072-salt-master-inventory-role/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/080-instance-proxy-server/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/080-instance-repo-server/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/090-instance-github/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/090-instance-keycloak/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/090-instance-mailrelay/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 0 - 1
test/aws-us-gov/mdr-test-c2/090-instance-mailrelay/terragrunt.hcl

@@ -30,7 +30,6 @@ generate "provider-ses" {
   if_exists = "overwrite_terragrunt"
   contents = <<EOF
 provider "aws" {
-  version = "~> 3.0"
   region = "${local.region_vars.locals.ses_region}"
   allowed_account_ids = [ "${local.account_vars.locals.aws_account_id}" ]
   profile = "govcloud"

+ 34 - 0
test/aws-us-gov/mdr-test-c2/090-instance-openvpn/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/090-instance-teleport/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/090-instance-vault/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/095-instance-sensu/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/096-sensu-configuration/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 1 - 0
test/aws-us-gov/mdr-test-c2/096-sensu-configuration/README.md

@@ -0,0 +1 @@
+../../../../prod/aws-us-gov/mdr-prod-c2/096-sensu-configuration/README.md

+ 0 - 8
test/aws-us-gov/mdr-test-c2/096-sensu-configuration/terragrunt.hcl

@@ -30,14 +30,6 @@ generate "sensu-provider" {
   path      = "sensu-provider.tf"
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
-terraform {
-  required_providers {
-    sensu = {
-      source = "jtopjian/sensu"
-      version = "0.10.5"
-    }
-  }
-}
 #Provider block for Sensu. 
 provider "sensu" {
   api_url   = "https://${dependency.instance-sensu.outputs.internal_alb_address}:8080"

+ 34 - 0
test/aws-us-gov/mdr-test-c2/099-vault-configuration/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 1 - 1
test/aws-us-gov/mdr-test-c2/099-vault-configuration/terragrunt.hcl

@@ -31,8 +31,8 @@ generate "vault-provider" {
   contents  = <<EOF
 #Provider block for Vault. 
 provider "vault" {
-  version = "~> 2.18.0"
   address = "https://${dependency.instance-vault.outputs.vault_alb_address}"
+  skip_tls_verify = true
 }
 EOF
 }

+ 34 - 0
test/aws-us-gov/mdr-test-c2/140-splunk-frozen-bucket/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/150-splunk-cluster-master/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/160-splunk-indexer-cluster/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/165-splunk-legacy-hec/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 0 - 1
test/aws-us-gov/mdr-test-c2/165-splunk-legacy-hec/terragrunt.hcl

@@ -21,7 +21,6 @@ generate "provider-legacy" {
   if_exists = "overwrite_terragrunt"
   contents  = <<EOF
 provider "aws" {
-  version = "~> 3.0"
   region = "us-east-1"
 
   assume_role {

+ 34 - 0
test/aws-us-gov/mdr-test-c2/170-splunk-searchhead/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/175-splunk-alsi/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/180-splunk-heavy-forwarder/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/190-splunk-fm-shared-search/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/190-splunk-mc/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/190-splunk-qcompliance-searchhead/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/200-customer-portal/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/205-customer-portal-lambda/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/250-phantom/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/270-nessus-security-center/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 34 - 0
test/aws-us-gov/mdr-test-c2/275-nessus-security-scanners/.terraform.lock.hcl

@@ -0,0 +1,34 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+  ]
+}
+
+provider "registry.terraform.io/jtopjian/sensu" {
+  version     = "0.10.5"
+  constraints = "0.10.5"
+  hashes = [
+    "h1:/i+iYOhp7+nC7rZHJcQ4TWf4POHGhbwShPuvyko+/0s=",
+  ]
+}

+ 36 - 0
test/aws-us-gov/mdr-test-malware/005-iam/.terraform.lock.hcl

@@ -0,0 +1,36 @@
+# This file is maintained automatically by "terraform init".
+# Manual edits may be lost in future updates.
+
+provider "registry.terraform.io/hashicorp/aws" {
+  version     = "3.37.0"
+  constraints = "3.37.0"
+  hashes = [
+    "h1:RvLGIfRZfbzY58wUja9B6CvGdgVVINy7zLVBdLqIelA=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/template" {
+  version     = "2.2.0"
+  constraints = "2.2.0"
+  hashes = [
+    "h1:0wlehNaxBX7GJQnPfQwTNvvAf38Jm0Nv7ssKGMaG6Og=",
+  ]
+}
+
+provider "registry.terraform.io/hashicorp/vault" {
+  version     = "2.19.1"
+  constraints = "2.19.1"
+  hashes = [
+    "h1:yz5QWTvycJvjR3Z5EaCLF6UC8hugPAz2eIy9NzymPoI=",
+    "zh:0c6ca9d49bc116788015bbf83f7e8e405e4e63bfd9dd198f29d501632bc7d79f",
+    "zh:1f13cbe8d6b98a9e0392c72320cd86d5253a09f3c45fe9f4baa2b71660621d1e",
+    "zh:365d07bec517cb17523526c3a6f1bd23dbedb7fe8868d28976998c5eff3b9932",
+    "zh:3ac807ce39cd11d5a573377b868bc547f1f24ac2fb7bf3d7e1ec5a62ead7c31f",
+    "zh:5eb21cf4628353fcbd44231b92d1e027340af98b2ba02aaa01d91b07989caa8c",
+    "zh:66bed701cd0372b864ba656c9a01deb15e6cd7ac4390a3933e034a01f7bbe703",
+    "zh:8dd523de854b59f7e837102064f23fcf33ee69d4d46feeb5a67796b7ba03d003",
+    "zh:a514911915ab7d7b5fda18a7ca1404ca0496a54088a6ef52e0b92e4e0d7ff85e",
+    "zh:b4020c332c2b5b992f56d0e3e7b4940f7dab63f2af5558d913e79834b90b4d80",
+    "zh:bdb1c77d22e7accedf4b501f139c306c46dcb58ff693b9a6dcaef356c6749ee1",
+  ]
+}

Some files were not shown because too many files changed in this diff