File tree Expand file tree Collapse file tree 17 files changed +21
-21
lines changed
aiml/inferentia/.workshop/terraform
continuousdelivery/codepipeline/.workshop/terraform
crossplane/.workshop/terraform
autoscaling/workloads/keda/.workshop/terraform
networking/vpc-lattice/.workshop/terraform
container-insights/.workshop/terraform
kubecost/.workshop/terraform
oss-metrics/.workshop/terraform
eks-pod-identity/.workshop/terraform
secrets-manager/.workshop/terraform Expand file tree Collapse file tree 17 files changed +21
-21
lines changed Original file line number Diff line number Diff line change @@ -12,7 +12,7 @@ terraform {
1212 }
1313 helm = {
1414 source = " hashicorp/helm"
15- version = " 2.17.0 "
15+ version = " 3.0.2 "
1616 }
1717 kubectl = {
1818 source = " gavinbunney/kubectl"
Original file line number Diff line number Diff line change @@ -105,7 +105,7 @@ resource "aws_s3_bucket" "inference" {
105105
106106module "iam_assumable_role_inference" {
107107 source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
108- version = " 5.60 .0"
108+ version = " 6.1 .0"
109109 create_role = true
110110 role_name = " ${ var . addon_context . eks_cluster_id } -inference"
111111 provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -248,7 +248,7 @@ resource "aws_kms_key" "artifact_encryption_key" {
248248
249249module "iam_assumable_role_ui" {
250250 source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
251- version = " 5.60 .0"
251+ version = " 6.1 .0"
252252 create_role = true
253253 role_name = " ${ var . addon_context . eks_cluster_id } -ecr-ui"
254254 provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -22,7 +22,7 @@ data "aws_ecrpublic_authorization_token" "token" {
2222
2323module "iam_assumable_role_carts" {
2424 source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
25- version = " 5.60 .0"
25+ version = " 6.1 .0"
2626 create_role = true
2727 role_name = " ${ var . addon_context . eks_cluster_id } -carts-ack"
2828 provider_url = var. addon_context . eks_oidc_issuer_url
8282
8383module "iam_assumable_role_ack" {
8484 source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
85- version = " 5.60 .0"
85+ version = " 6.1 .0"
8686 create_role = true
8787 role_name = " ${ var . addon_context . eks_cluster_id } -ack-controller"
8888 provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -42,7 +42,7 @@ locals {
4242
4343module "upbound_irsa_aws" {
4444 source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
45- version = " 5.60 .0"
45+ version = " 6.1 .0"
4646
4747 role_name_prefix = " ${ var . addon_context . eks_cluster_id } -ddb-upbound-"
4848 policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ddb-upbound-"
@@ -102,7 +102,7 @@ resource "kubectl_manifest" "upbound_aws_provider_config" {
102102
103103module "iam_assumable_role_carts" {
104104 source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
105- version = " 5.60 .0"
105+ version = " 6.1 .0"
106106 create_role = true
107107 role_name = " ${ var . addon_context . eks_cluster_id } -carts-crossplane"
108108 provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -20,7 +20,7 @@ module "eks_blueprints_addons" {
2020
2121module "iam_assumable_role_keda" {
2222 source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
23- version = " 5.60 .0"
23+ version = " 6.1 .0"
2424 create_role = true
2525 role_name = " ${ var . addon_context . eks_cluster_id } -keda"
2626 provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change 11module "ebs_csi_driver_irsa" {
22 source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3- version = " 5.60 .0"
3+ version = " 6.1 .0"
44
55 role_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
66 policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
Original file line number Diff line number Diff line change 11module "efs_csi_driver_irsa" {
22 source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3- version = " 5.60 .0"
3+ version = " 6.1 .0"
44
55 role_name_prefix = " ${ var . addon_context . eks_cluster_id } -efs-csi-"
66 policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
Original file line number Diff line number Diff line change 11# Create FSxZ OIDC providers
22module "fsxz_oidc_providers" {
33 source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
4- version = " 5.60 .0"
4+ version = " 6.1 .0"
55
66 # Create prefixes
77 role_name_prefix = " ${ var . addon_context . eks_cluster_id } -fsxz-csi-"
@@ -145,7 +145,7 @@ resource "aws_security_group_rule" "fsxz_egress" {
145145
146146module "iam_assumable_role_fsx" {
147147 source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
148- version = " 5.60 .0"
148+ version = " 6.1 .0"
149149 create_role = true
150150 role_name = " ${ var . addon_context . eks_cluster_id } -fsxz"
151151 provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ resource "aws_s3_bucket" "mountpoint_s3" {
88# Create S3 CSI Driver IAM Role and associated policy
99module "mountpoint_s3_csi_driver_irsa" {
1010 source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
11- version = " 5.60 .0"
11+ version = " 6.1 .0"
1212
1313 # Create prefixes
1414 role_name_prefix = " ${ var . addon_context . eks_cluster_id } -s3-csi-"
You can’t perform that action at this time.
0 commit comments