Skip to content

Commit 813b0a3

Browse files
chore(deps): update terraform
1 parent ec9da28 commit 813b0a3

File tree

25 files changed

+47
-47
lines changed
  • manifests
    • .workshop/terraform
    • modules
      • aiml
        • chatbot/.workshop/terraform
        • inferentia/.workshop/terraform
      • automation
        • controlplanes
        • gitops/flux/.workshop/terraform
      • autoscaling
        • compute
          • cluster-autoscaler/.workshop/terraform
          • karpenter/.workshop/terraform
        • workloads/keda/.workshop/terraform
      • exposing
        • ingress/.workshop/terraform
        • load-balancer/.workshop/terraform
      • fundamentals/storage
      • networking
        • network-policies/.workshop/terraform
        • securitygroups-for-pods/.workshop/terraform/preprovision
        • vpc-lattice/.workshop/terraform
      • observability
        • container-insights/.workshop/terraform
        • kubecost/.workshop/terraform
        • oss-metrics/.workshop/terraform
        • resiliency/.workshop/terraform
      • security
        • eks-pod-identity/.workshop/terraform
        • irsa/.workshop/terraform
        • secrets-manager/.workshop/terraform

25 files changed

+47
-47
lines changed

manifests/.workshop/terraform/base.tf

+5-5
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,22 @@ terraform {
44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = "5.72.0"
7+
version = "5.90.0"
88
}
99
kubernetes = {
1010
source = "hashicorp/kubernetes"
11-
version = "2.32.0"
11+
version = "2.36.0"
1212
}
1313
helm = {
1414
source = "hashicorp/helm"
15-
version = "2.15.0"
15+
version = "2.17.0"
1616
}
1717
kubectl = {
1818
source = "gavinbunney/kubectl"
19-
version = "1.14.0"
19+
version = "1.19.0"
2020
}
2121
local = {
22-
version = "2.5.1"
22+
version = "2.5.2"
2323
}
2424
}
2525
}

manifests/modules/aiml/chatbot/.workshop/terraform/main.tf

+3-3
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ data "aws_ecrpublic_authorization_token" "token" {
2424

2525
module "eks_blueprints_addons" {
2626
source = "aws-ia/eks-blueprints-addons/aws"
27-
version = "1.19.0"
27+
version = "1.20.0"
2828

2929
enable_aws_load_balancer_controller = true
3030
aws_load_balancer_controller = {
@@ -71,7 +71,7 @@ resource "aws_eks_addon" "pod_identity" {
7171

7272
module "karpenter" {
7373
source = "terraform-aws-modules/eks/aws//modules/karpenter"
74-
version = "20.24"
74+
version = "20.34"
7575

7676
cluster_name = var.addon_context.eks_cluster_id
7777
enable_v1_permissions = true
@@ -104,7 +104,7 @@ resource "helm_release" "karpenter" {
104104
repository_password = data.aws_ecrpublic_authorization_token.token.password
105105
chart = "karpenter"
106106
# renovate: datasource=github-releases depName=aws/karpenter-provider-aws
107-
version = "1.0.2"
107+
version = "1.3.1"
108108
wait = true
109109

110110
values = [

manifests/modules/aiml/inferentia/.workshop/terraform/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ resource "aws_eks_addon" "pod_identity" {
3131

3232
module "karpenter" {
3333
source = "terraform-aws-modules/eks/aws//modules/karpenter"
34-
version = "20.24.0"
34+
version = "20.34.0"
3535

3636
cluster_name = var.addon_context.eks_cluster_id
3737
enable_v1_permissions = true
@@ -106,7 +106,7 @@ resource "aws_s3_bucket" "inference" {
106106

107107
module "iam_assumable_role_inference" {
108108
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
109-
version = "5.44.0"
109+
version = "5.53.0"
110110
create_role = true
111111
role_name = "${var.addon_context.eks_cluster_id}-inference"
112112
provider_url = var.addon_context.eks_oidc_issuer_url

manifests/modules/automation/controlplanes/ack/.workshop/terraform/main.tf

+3-3
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ data "aws_ecrpublic_authorization_token" "token" {
2222

2323
module "iam_assumable_role_carts" {
2424
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
25-
version = "5.44.0"
25+
version = "5.53.0"
2626
create_role = true
2727
role_name = "${var.addon_context.eks_cluster_id}-carts-ack"
2828
provider_url = var.addon_context.eks_oidc_issuer_url
@@ -82,7 +82,7 @@ EOF
8282

8383
module "iam_assumable_role_ack" {
8484
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
85-
version = "5.44.0"
85+
version = "5.53.0"
8686
create_role = true
8787
role_name = "${var.addon_context.eks_cluster_id}-ack-controller"
8888
provider_url = var.addon_context.eks_oidc_issuer_url
@@ -94,7 +94,7 @@ module "iam_assumable_role_ack" {
9494

9595
module "eks_blueprints_addons" {
9696
source = "aws-ia/eks-blueprints-addons/aws"
97-
version = "1.19.0"
97+
version = "1.20.0"
9898

9999
enable_aws_load_balancer_controller = true
100100
aws_load_balancer_controller = {

manifests/modules/automation/controlplanes/crossplane/.workshop/terraform/main.tf

+3-3
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ locals {
4242

4343
module "upbound_irsa_aws" {
4444
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
45-
version = "5.44.0"
45+
version = "5.53.0"
4646

4747
role_name_prefix = "${var.addon_context.eks_cluster_id}-ddb-upbound-"
4848
policy_name_prefix = "${var.addon_context.eks_cluster_id}-ddb-upbound-"
@@ -102,7 +102,7 @@ resource "kubectl_manifest" "upbound_aws_provider_config" {
102102

103103
module "iam_assumable_role_carts" {
104104
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
105-
version = "5.44.0"
105+
version = "5.53.0"
106106
create_role = true
107107
role_name = "${var.addon_context.eks_cluster_id}-carts-crossplane"
108108
provider_url = var.addon_context.eks_oidc_issuer_url
@@ -137,7 +137,7 @@ EOF
137137

138138
module "eks_blueprints_addons" {
139139
source = "aws-ia/eks-blueprints-addons/aws"
140-
version = "1.19.0"
140+
version = "1.20.0"
141141

142142
enable_aws_load_balancer_controller = true
143143
aws_load_balancer_controller = {

manifests/modules/automation/gitops/flux/.workshop/terraform/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -511,7 +511,7 @@ resource "aws_codepipeline" "codepipeline" {
511511

512512
module "iam_assumable_role_ui" {
513513
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
514-
version = "5.44.0"
514+
version = "5.53.0"
515515
create_role = true
516516
role_name = "${var.addon_context.eks_cluster_id}-ecr-ui"
517517
provider_url = var.addon_context.eks_oidc_issuer_url
@@ -541,7 +541,7 @@ EOF
541541

542542
module "eks_blueprints_addons" {
543543
source = "aws-ia/eks-blueprints-addons/aws"
544-
version = "1.19.0"
544+
version = "1.20.0"
545545

546546
enable_aws_load_balancer_controller = true
547547
aws_load_balancer_controller = {

manifests/modules/autoscaling/compute/cluster-autoscaler/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "eks_blueprints_addons" {
22
source = "aws-ia/eks-blueprints-addons/aws"
3-
version = "1.19.0"
3+
version = "1.20.0"
44

55
cluster_name = var.addon_context.eks_cluster_id
66
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint

manifests/modules/autoscaling/compute/karpenter/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ resource "aws_eks_addon" "pod_identity" {
77

88
module "karpenter" {
99
source = "terraform-aws-modules/eks/aws//modules/karpenter"
10-
version = "20.24.0"
10+
version = "20.34.0"
1111

1212
cluster_name = var.addon_context.eks_cluster_id
1313
enable_pod_identity = true

manifests/modules/autoscaling/workloads/keda/.workshop/terraform/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ data "aws_partition" "current" {}
22

33
module "eks_blueprints_addons" {
44
source = "aws-ia/eks-blueprints-addons/aws"
5-
version = "1.19.0"
5+
version = "1.20.0"
66

77
cluster_name = var.addon_context.eks_cluster_id
88
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint
@@ -20,7 +20,7 @@ module "eks_blueprints_addons" {
2020

2121
module "iam_assumable_role_keda" {
2222
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
23-
version = "5.44.0"
23+
version = "5.53.0"
2424
create_role = true
2525
role_name = "${var.addon_context.eks_cluster_id}-keda"
2626
provider_url = var.addon_context.eks_oidc_issuer_url

manifests/modules/exposing/ingress/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "eks_blueprints_addons" {
22
source = "aws-ia/eks-blueprints-addons/aws"
3-
version = "1.19.0"
3+
version = "1.20.0"
44

55
cluster_name = var.addon_context.eks_cluster_id
66
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint

manifests/modules/exposing/load-balancer/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "eks_blueprints_addons" {
22
source = "aws-ia/eks-blueprints-addons/aws"
3-
version = "1.19.0"
3+
version = "1.20.0"
44

55
cluster_name = var.addon_context.eks_cluster_id
66
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint

manifests/modules/fundamentals/storage/ebs/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "ebs_csi_driver_irsa" {
22
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3-
version = "5.44.0"
3+
version = "5.53.0"
44

55
role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-"
66
policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-"

manifests/modules/fundamentals/storage/efs/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "efs_csi_driver_irsa" {
22
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3-
version = "5.44.0"
3+
version = "5.53.0"
44

55
role_name_prefix = "${var.addon_context.eks_cluster_id}-efs-csi-"
66
policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-"

manifests/modules/fundamentals/storage/fsxz/.workshop/terraform/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Create FSxZ OIDC providers
22
module "fsxz_oidc_providers" {
33
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
4-
version = "5.39.1"
4+
version = "5.53.0"
55

66
# Create prefixes
77
role_name_prefix = "${var.addon_context.eks_cluster_id}-fsxz-csi-"
@@ -130,7 +130,7 @@ resource "aws_security_group_rule" "fsxz_egress" {
130130

131131
module "iam_assumable_role_fsx" {
132132
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
133-
version = "5.44.0"
133+
version = "5.53.0"
134134
create_role = true
135135
role_name = "${var.addon_context.eks_cluster_id}-fsxz"
136136
provider_url = var.addon_context.eks_oidc_issuer_url

manifests/modules/fundamentals/storage/s3/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ resource "aws_s3_bucket" "mountpoint_s3" {
88
# Create S3 CSI Driver IAM Role and associated policy
99
module "mountpoint_s3_csi_driver_irsa" {
1010
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
11-
version = "5.39.1"
11+
version = "5.53.0"
1212

1313
# Create prefixes
1414
role_name_prefix = "${var.addon_context.eks_cluster_id}-s3-csi-"

manifests/modules/networking/network-policies/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "eks_blueprints_addons" {
22
source = "aws-ia/eks-blueprints-addons/aws"
3-
version = "1.19.0"
3+
version = "1.20.0"
44

55
enable_aws_load_balancer_controller = true
66
aws_load_balancer_controller = {

manifests/modules/networking/securitygroups-for-pods/.workshop/terraform/preprovision/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ data "aws_subnets" "private_sg_rds" {
1919

2020
module "catalog_mysql" {
2121
source = "terraform-aws-modules/rds/aws"
22-
version = "6.9.0"
22+
version = "6.10.0"
2323

2424
identifier = "${var.eks_cluster_id}-catalog"
2525

@@ -61,7 +61,7 @@ resource "random_string" "catalog_db_master" {
6161

6262
module "catalog_rds_ingress" {
6363
source = "terraform-aws-modules/security-group/aws"
64-
version = "5.2.0"
64+
version = "5.3.0"
6565

6666
name = "${var.eks_cluster_id}-catalog-rds"
6767
description = "Catalog RDS security group"

manifests/modules/networking/vpc-lattice/.workshop/terraform/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "eks_blueprints_addons" {
22
source = "aws-ia/eks-blueprints-addons/aws"
3-
version = "1.19.0"
3+
version = "1.20.0"
44

55
enable_aws_load_balancer_controller = true
66
aws_load_balancer_controller = {
@@ -19,7 +19,7 @@ module "eks_blueprints_addons" {
1919

2020
module "iam_assumable_role_lattice" {
2121
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
22-
version = "5.44.0"
22+
version = "5.53.0"
2323
create_role = true
2424
role_name = "${var.addon_context.eks_cluster_id}-lattice"
2525
provider_url = var.addon_context.eks_oidc_issuer_url

manifests/modules/observability/container-insights/.workshop/terraform/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ data "aws_region" "current" {}
33

44
module "eks_blueprints_addons" {
55
source = "aws-ia/eks-blueprints-addons/aws"
6-
version = "1.19.0"
6+
version = "1.20.0"
77

88
cluster_name = var.addon_context.eks_cluster_id
99
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint
@@ -82,7 +82,7 @@ module "opentelemetry_operator" {
8282

8383
module "iam_assumable_role_adot_ci" {
8484
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
85-
version = "5.44.0"
85+
version = "5.53.0"
8686
create_role = true
8787
role_name = "${var.addon_context.eks_cluster_id}-adot-collector-ci"
8888
provider_url = var.addon_context.eks_oidc_issuer_url

manifests/modules/observability/kubecost/.workshop/terraform/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "ebs_csi_driver_irsa" {
22
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3-
version = "5.44.0"
3+
version = "5.53.0"
44

55
role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-"
66
policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-"
@@ -19,7 +19,7 @@ module "ebs_csi_driver_irsa" {
1919

2020
module "eks_blueprints_addons" {
2121
source = "aws-ia/eks-blueprints-addons/aws"
22-
version = "1.19.0"
22+
version = "1.20.0"
2323

2424
cluster_name = var.addon_context.eks_cluster_id
2525
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint

manifests/modules/observability/oss-metrics/.workshop/terraform/main.tf

+3-3
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ data "aws_partition" "current" {}
22

33
module "ebs_csi_driver_irsa" {
44
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
5-
version = "5.44.0"
5+
version = "5.53.0"
66

77
role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-"
88
policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-"
@@ -21,7 +21,7 @@ module "ebs_csi_driver_irsa" {
2121

2222
module "eks_blueprints_addons" {
2323
source = "aws-ia/eks-blueprints-addons/aws"
24-
version = "1.19.0"
24+
version = "1.20.0"
2525

2626
cluster_name = var.addon_context.eks_cluster_id
2727
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint
@@ -115,7 +115,7 @@ resource "aws_prometheus_workspace" "this" {
115115

116116
module "iam_assumable_role_adot" {
117117
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
118-
version = "5.44.0"
118+
version = "5.53.0"
119119

120120
create_role = true
121121
role_name = "${var.addon_context.eks_cluster_id}-adot-collector"

manifests/modules/observability/resiliency/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "eks_blueprints_addons" {
22
source = "aws-ia/eks-blueprints-addons/aws"
3-
version = "1.19.0"
3+
version = "1.20.0"
44

55
cluster_name = var.addon_context.eks_cluster_id
66
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint

manifests/modules/security/eks-pod-identity/.workshop/terraform/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ data "aws_partition" "current" {}
44

55
module "eks_blueprints_addons" {
66
source = "aws-ia/eks-blueprints-addons/aws"
7-
version = "1.19.0"
7+
version = "1.20.0"
88

99
enable_aws_load_balancer_controller = true
1010
aws_load_balancer_controller = {
@@ -92,7 +92,7 @@ resource "aws_dynamodb_table" "carts" {
9292

9393
module "iam_assumable_role_carts" {
9494
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role"
95-
version = "5.44.0"
95+
version = "5.53.0"
9696
create_role = true
9797
role_requires_mfa = false
9898
role_name = "${var.addon_context.eks_cluster_id}-carts-dynamo"

manifests/modules/security/irsa/.workshop/terraform/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ data "aws_region" "current" {}
44

55
module "eks_blueprints_addons" {
66
source = "aws-ia/eks-blueprints-addons/aws"
7-
version = "1.19.0"
7+
version = "1.20.0"
88

99
enable_aws_load_balancer_controller = true
1010
aws_load_balancer_controller = {
@@ -92,7 +92,7 @@ resource "aws_dynamodb_table" "carts" {
9292

9393
module "iam_assumable_role_carts" {
9494
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
95-
version = "5.44.0"
95+
version = "5.53.0"
9696
create_role = true
9797
role_name = "${var.addon_context.eks_cluster_id}-carts-dynamo"
9898
provider_url = var.addon_context.eks_oidc_issuer_url

manifests/modules/security/secrets-manager/.workshop/terraform/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ module "external_secrets" {
4242

4343
module "secrets_manager_role" {
4444
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
45-
version = "5.44.0"
45+
version = "5.53.0"
4646

4747
role_name_prefix = "${var.eks_cluster_id}-secrets-"
4848
policy_name_prefix = "${var.eks_cluster_id}-secrets-"

0 commit comments

Comments
 (0)