11# BEGIN MSFT
22
33module "worklytics_connectors_msft_365" {
4- source = " git::https://github.com/worklytics/psoxy//infra/modules/worklytics-connectors-msft-365?ref=v0.4.53 "
4+ source = " git::https://github.com/worklytics/psoxy//infra/modules/worklytics-connectors-msft-365?ref=v0.4.54 "
55
66
77 enabled_connectors = var. enabled_connectors
@@ -45,7 +45,7 @@ data "aws_region" "current" {
4545module "cognito_identity_pool" {
4646 count = local. msft_365_enabled ? 1 : 0 # only provision identity pool if MSFT-365 connectors are enabled
4747
48- source = " git::https://github.com/worklytics/psoxy//infra/modules/aws-cognito-pool?ref=v0.4.53 "
48+ source = " git::https://github.com/worklytics/psoxy//infra/modules/aws-cognito-pool?ref=v0.4.54 "
4949
5050 developer_provider_name = local. developer_provider_name
5151 name = " ${ local . env_qualifier } -azure-ad-federation"
@@ -54,7 +54,7 @@ module "cognito_identity_pool" {
5454module "cognito_identity" {
5555 count = local. msft_365_enabled ? 1 : 0 # only provision identity pool if MSFT-365 connectors are enabled
5656
57- source = " git::https://github.com/worklytics/psoxy//infra/modules/aws-cognito-identity-cli?ref=v0.4.53 "
57+ source = " git::https://github.com/worklytics/psoxy//infra/modules/aws-cognito-identity-cli?ref=v0.4.54 "
5858
5959 aws_region = data. aws_region . current . id
6060 aws_role = var. aws_assume_role_arn
@@ -75,7 +75,7 @@ resource "aws_iam_role_policy_attachment" "cognito_lambda_policy" {
7575module "msft_connection_auth_federation" {
7676 for_each = module. worklytics_connectors_msft_365 . enabled_api_connectors
7777
78- source = " git::https://github.com/worklytics/psoxy//infra/modules/azuread-federated-credentials?ref=v0.4.53 "
78+ source = " git::https://github.com/worklytics/psoxy//infra/modules/azuread-federated-credentials?ref=v0.4.54 "
7979
8080 application_object_id = each. value . connector . id
8181 display_name = " ${ local . env_qualifier } AccessFromAWS"
0 commit comments