diff --git a/README.md b/README.md index 2d02e548e..72c7a911f 100644 --- a/README.md +++ b/README.md @@ -1,54 +1,9 @@ -[![landingzones](https://github.com/Azure/caf-terraform-landingzones/actions/workflows/landingzones-tf100.yml/badge.svg)](https://github.com/Azure/caf-terraform-landingzones/actions/workflows/landingzones-tf100.yml) +***Warning: Important information for customers using azure/caf-terraform-landingzones*** -[![Gitter](https://badges.gitter.im/aztfmod/community.svg)](https://gitter.im/aztfmod/community?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) +This solution, offered by the Open-Source community, will no longer receive contributions from Microsoft. -# Azure Terraform SRE +Customers are encouraged to transition to Microsoft Azure Verified Modules (https://aka.ms/avm) for continued support and updates from Microsoft. +Please note, this repository is scheduled for decommissioning and will be removed on July 1, 2025. -Azure Terraform SRE (formely CAF Terraform) ambitions: - -* Equip the Site Reliability Engineering teams for Terraform on Azure. -* Democratize an IaC: Infrastructure-as-Configuration. -* Commoditize state management and enterprise-wide composition. -* Standardize deployments leveraging official Azure landing zones components. -* Propose a prescriptive guidance on how to enable DevOps for infrastructure as code on Microsoft Azure. -* Foster a community of Azure *Terraformers* using a common set of practices and sharing best practices. - - -You can review the different components parts of the Azure Terraform SRE and look at the quick intro video below: - -[![caf_elements](./_pictures/caf_elements.png)](https://www.youtube.com/watch?v=FlQ17u4NNts "CAF Introduction") - - -## :rocket: Getting started - -When starting an enterprise deployment, we recommend you start creating a configuration repository where you craft the configuration files for your environments. - -The best way to start is to clone the [platform starter repository](https://github.com/Azure/caf-terraform-landingzones-platform-starter) and getting started with the configuration files. - -If you are reading this, you are probably interested also in reading the doc as below: -:books: Read our [centralized documentation page](https://aka.ms/caf/terraform) - -## Community - -Feel free to open an issue for feature or bug, or to submit a PR. - -In case you have any question, you can reach out to tf-landingzones at microsoft dot com. - -You can also reach us on [Gitter](https://gitter.im/aztfmod/community?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) - -## Contributing - -This project welcomes contributions and suggestions. Most contributions require you to agree to a -Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us -the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com. - -When you submit a pull request, a CLA bot will automatically determine whether you need to provide -a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions -provided by the bot. You will only need to do this once across all repos using our CLA. - -## Code of conduct - -This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/). -For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or -contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments. +Customers interested in maintaining their use of this community solution should refer to (https://github.com/aztfmod/caf-terraform-landingzones/issues/1) diff --git a/caf_launchpad/dynamic_secrets.tf b/caf_launchpad/dynamic_secrets.tf index 264b8f20f..26d0ed199 100644 --- a/caf_launchpad/dynamic_secrets.tf +++ b/caf_launchpad/dynamic_secrets.tf @@ -1,7 +1,7 @@ module "dynamic_keyvault_secrets" { source = "aztfmod/caf/azurerm//modules/security/dynamic_keyvault_secrets" - version = "5.7.11" + version = "5.7.13" for_each = try(var.dynamic_keyvault_secrets, {}) diff --git a/caf_launchpad/landingzone.tf b/caf_launchpad/landingzone.tf index 634983260..c25bb7e55 100644 --- a/caf_launchpad/landingzone.tf +++ b/caf_launchpad/landingzone.tf @@ -1,6 +1,6 @@ module "launchpad" { source = "aztfmod/caf/azurerm" - version = "5.7.11" + version = "5.7.13" # source = "git::https://github.com/aztfmod/terraform-azurerm-caf.git?ref=main" providers = { diff --git a/caf_solution/dynamic_secrets.tf b/caf_solution/dynamic_secrets.tf index 023821d6c..1ea881fa4 100644 --- a/caf_solution/dynamic_secrets.tf +++ b/caf_solution/dynamic_secrets.tf @@ -1,6 +1,6 @@ module "dynamic_keyvault_secrets" { source = "aztfmod/caf/azurerm//modules/security/dynamic_keyvault_secrets" - version = "5.7.11" + version = "5.7.13" for_each = { for keyvault_key, secrets in try(var.dynamic_keyvault_secrets, {}) : keyvault_key => { diff --git a/caf_solution/landingzone.tf b/caf_solution/landingzone.tf index a1b4d49d2..de567d71f 100644 --- a/caf_solution/landingzone.tf +++ b/caf_solution/landingzone.tf @@ -1,6 +1,6 @@ module "solution" { source = "aztfmod/caf/azurerm" - version = "5.7.11" + version = "5.7.13" # source = "git::https://github.com/aztfmod/terraform-azurerm-caf.git?ref=main" providers = {