File tree Expand file tree Collapse file tree 17 files changed +21
-21
lines changed
aiml/inferentia/.workshop/terraform
continuousdelivery/codepipeline/.workshop/terraform
crossplane/.workshop/terraform
autoscaling/workloads/keda/.workshop/terraform
networking/vpc-lattice/.workshop/terraform
container-insights/.workshop/terraform
kubecost/.workshop/terraform
oss-metrics/.workshop/terraform
eks-pod-identity/.workshop/terraform
secrets-manager/.workshop/terraform Expand file tree Collapse file tree 17 files changed +21
-21
lines changed Original file line number Diff line number Diff line change @@ -12,7 +12,7 @@ terraform {
12
12
}
13
13
helm = {
14
14
source = " hashicorp/helm"
15
- version = " 2.17.0 "
15
+ version = " 3.0.2 "
16
16
}
17
17
kubectl = {
18
18
source = " gavinbunney/kubectl"
Original file line number Diff line number Diff line change @@ -105,7 +105,7 @@ resource "aws_s3_bucket" "inference" {
105
105
106
106
module "iam_assumable_role_inference" {
107
107
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
108
- version = " 5.60 .0"
108
+ version = " 6.0 .0"
109
109
create_role = true
110
110
role_name = " ${ var . addon_context . eks_cluster_id } -inference"
111
111
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -248,7 +248,7 @@ resource "aws_kms_key" "artifact_encryption_key" {
248
248
249
249
module "iam_assumable_role_ui" {
250
250
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
251
- version = " 5.60 .0"
251
+ version = " 6.0 .0"
252
252
create_role = true
253
253
role_name = " ${ var . addon_context . eks_cluster_id } -ecr-ui"
254
254
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -22,7 +22,7 @@ data "aws_ecrpublic_authorization_token" "token" {
22
22
23
23
module "iam_assumable_role_carts" {
24
24
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
25
- version = " 5.60 .0"
25
+ version = " 6.0 .0"
26
26
create_role = true
27
27
role_name = " ${ var . addon_context . eks_cluster_id } -carts-ack"
28
28
provider_url = var. addon_context . eks_oidc_issuer_url
82
82
83
83
module "iam_assumable_role_ack" {
84
84
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
85
- version = " 5.60 .0"
85
+ version = " 6.0 .0"
86
86
create_role = true
87
87
role_name = " ${ var . addon_context . eks_cluster_id } -ack-controller"
88
88
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -42,7 +42,7 @@ locals {
42
42
43
43
module "upbound_irsa_aws" {
44
44
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
45
- version = " 5.60 .0"
45
+ version = " 6.0 .0"
46
46
47
47
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -ddb-upbound-"
48
48
policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ddb-upbound-"
@@ -102,7 +102,7 @@ resource "kubectl_manifest" "upbound_aws_provider_config" {
102
102
103
103
module "iam_assumable_role_carts" {
104
104
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
105
- version = " 5.60 .0"
105
+ version = " 6.0 .0"
106
106
create_role = true
107
107
role_name = " ${ var . addon_context . eks_cluster_id } -carts-crossplane"
108
108
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -20,7 +20,7 @@ module "eks_blueprints_addons" {
20
20
21
21
module "iam_assumable_role_keda" {
22
22
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
23
- version = " 5.60 .0"
23
+ version = " 6.0 .0"
24
24
create_role = true
25
25
role_name = " ${ var . addon_context . eks_cluster_id } -keda"
26
26
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change 1
1
module "ebs_csi_driver_irsa" {
2
2
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3
- version = " 5.60 .0"
3
+ version = " 6.0 .0"
4
4
5
5
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
6
6
policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
Original file line number Diff line number Diff line change 1
1
module "efs_csi_driver_irsa" {
2
2
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3
- version = " 5.60 .0"
3
+ version = " 6.0 .0"
4
4
5
5
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -efs-csi-"
6
6
policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
Original file line number Diff line number Diff line change 1
1
# Create FSxZ OIDC providers
2
2
module "fsxz_oidc_providers" {
3
3
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
4
- version = " 5.60 .0"
4
+ version = " 6.0 .0"
5
5
6
6
# Create prefixes
7
7
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -fsxz-csi-"
@@ -145,7 +145,7 @@ resource "aws_security_group_rule" "fsxz_egress" {
145
145
146
146
module "iam_assumable_role_fsx" {
147
147
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
148
- version = " 5.60 .0"
148
+ version = " 6.0 .0"
149
149
create_role = true
150
150
role_name = " ${ var . addon_context . eks_cluster_id } -fsxz"
151
151
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ resource "aws_s3_bucket" "mountpoint_s3" {
8
8
# Create S3 CSI Driver IAM Role and associated policy
9
9
module "mountpoint_s3_csi_driver_irsa" {
10
10
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
11
- version = " 5.60 .0"
11
+ version = " 6.0 .0"
12
12
13
13
# Create prefixes
14
14
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -s3-csi-"
You can’t perform that action at this time.
0 commit comments