Skip to content

Commit

Permalink
chore(deps): update terraform
Browse files Browse the repository at this point in the history
  • Loading branch information
renovate[bot] authored Jun 1, 2024
1 parent 8b86451 commit 11f31d4
Show file tree
Hide file tree
Showing 21 changed files with 30 additions and 30 deletions.
4 changes: 2 additions & 2 deletions manifests/.workshop/terraform/base.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@ terraform {
required_providers {
kubernetes = {
source = "hashicorp/kubernetes"
version = "2.29.0"
version = "2.30.0"
}
helm = {
source = "hashicorp/helm"
version = "2.13.1"
version = "2.13.2"
}
kubectl = {
source = "gavinbunney/kubectl"
Expand Down
4 changes: 2 additions & 2 deletions manifests/modules/aiml/inferentia/.workshop/terraform/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ data "aws_ecrpublic_authorization_token" "token" {

module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_karpenter = true

Expand Down Expand Up @@ -59,7 +59,7 @@ resource "aws_s3_bucket" "inference" {

module "iam_assumable_role_inference" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.39.0"
version = "5.39.1"
create_role = true
role_name = "${var.addon_context.eks_cluster_id}-inference"
provider_url = var.addon_context.eks_oidc_issuer_url
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ EOF

module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_aws_load_balancer_controller = true
aws_load_balancer_controller = {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ locals {

module "upbound_irsa_aws" {
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.39.0"
version = "5.39.1"

role_name_prefix = "ddb-upbound-aws-"
assume_role_condition_test = "StringLike"
Expand Down Expand Up @@ -124,7 +124,7 @@ EOF

module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_aws_load_balancer_controller = true
aws_load_balancer_controller = {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -511,7 +511,7 @@ resource "aws_codepipeline" "codepipeline" {

module "iam_assumable_role_ui" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.39.0"
version = "5.39.1"
create_role = true
role_name = "${var.addon_context.eks_cluster_id}-ecr-ui"
provider_url = var.addon_context.eks_oidc_issuer_url
Expand Down Expand Up @@ -541,7 +541,7 @@ EOF

module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_aws_load_balancer_controller = true
aws_load_balancer_controller = {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

cluster_name = var.addon_context.eks_cluster_id
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ data "aws_ecrpublic_authorization_token" "token" {

module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_karpenter = true

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

cluster_name = var.addon_context.eks_cluster_id
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_aws_load_balancer_controller = true
aws_load_balancer_controller = {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_aws_load_balancer_controller = true
aws_load_balancer_controller = {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "ebs_csi_driver_irsa" {
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.39.0"
version = "5.39.1"

role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-"

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "efs_csi_driver_irsa" {
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.39.0"
version = "5.39.1"

role_name_prefix = "${var.addon_context.eks_cluster_id}-efs-csi-"

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_aws_load_balancer_controller = true

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ data "aws_subnets" "private_sg_rds" {

module "catalog_mysql" {
source = "terraform-aws-modules/rds/aws"
version = "6.5.5"
version = "6.6.0"

identifier = "${var.eks_cluster_id}-catalog"

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_aws_load_balancer_controller = true
aws_load_balancer_controller = {
Expand All @@ -15,7 +15,7 @@ module "eks_blueprints_addons" {

module "iam_assumable_role_lattice" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.39.0"
version = "5.39.1"
create_role = true
role_name = "${var.addon_context.eks_cluster_id}-lattice"
provider_url = var.addon_context.eks_oidc_issuer_url
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ module "adot_operator" {

module "iam_assumable_role_adot_ci" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.39.0"
version = "5.39.1"
create_role = true
role_name = "${var.addon_context.eks_cluster_id}-adot-collector-ci"
provider_url = var.addon_context.eks_oidc_issuer_url
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ data "aws_ecrpublic_authorization_token" "token" {

module "ebs_csi_driver_irsa" {
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.39.0"
version = "5.39.1"

role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-"

Expand All @@ -27,7 +27,7 @@ module "ebs_csi_driver_irsa" {

module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

cluster_name = var.addon_context.eks_cluster_id
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ module "aws_ebs_csi_driver" {

module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

cluster_name = var.addon_context.eks_cluster_id
cluster_endpoint = var.addon_context.aws_eks_cluster_endpoint
Expand Down Expand Up @@ -63,7 +63,7 @@ resource "aws_prometheus_workspace" "this" {

module "iam_assumable_role_adot" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.39.0"
version = "5.39.1"
create_role = true
role_name = "${var.addon_context.eks_cluster_id}-adot-collector"
provider_url = var.addon_context.eks_oidc_issuer_url
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ data "aws_partition" "current" {}

module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_aws_load_balancer_controller = true
aws_load_balancer_controller = {
Expand Down Expand Up @@ -86,7 +86,7 @@ resource "aws_dynamodb_table" "carts" {

module "iam_assumable_role_carts" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role"
version = "5.39.0"
version = "5.39.1"
create_role = true
role_requires_mfa = false
role_name = "${var.addon_context.eks_cluster_id}-carts-dynamo"
Expand Down
4 changes: 2 additions & 2 deletions manifests/modules/security/irsa/.workshop/terraform/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ data "aws_region" "current" {}

module "eks_blueprints_addons" {
source = "aws-ia/eks-blueprints-addons/aws"
version = "1.16.2"
version = "1.16.3"

enable_aws_load_balancer_controller = true
aws_load_balancer_controller = {
Expand Down Expand Up @@ -86,7 +86,7 @@ resource "aws_dynamodb_table" "carts" {

module "iam_assumable_role_carts" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.39.0"
version = "5.39.1"
create_role = true
role_name = "${var.addon_context.eks_cluster_id}-carts-dynamo"
provider_url = var.addon_context.eks_oidc_issuer_url
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ module "external_secrets" {

module "secrets_manager_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.39.0"
version = "5.39.1"

role_name_prefix = "${var.eks_cluster_id}-secrets-"

Expand Down

0 comments on commit 11f31d4

Please sign in to comment.