Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 0.7.1 #26

Merged
merged 7 commits into from
Apr 16, 2024
Merged
Show file tree
Hide file tree
Changes from 6 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion cert-manager.tf
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ locals {
module "cert_manager_irsa" {
count = var.cert_manager ? 1 : 0
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "~> 5.37.1"
version = "~> 5.39.0"

role_name = "${var.cluster_name}-cert-manager-role"

Expand Down
2 changes: 1 addition & 1 deletion crossplane.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
module "crossplane_irsa" {
count = var.crossplane && var.crossplane_irsa ? 1 : 0
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "~> 5.37.1"
version = "~> 5.39.0"

role_name = "${var.cluster_name}-crossplane-role"

Expand Down
2 changes: 1 addition & 1 deletion ebs-csi.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
module "eks_ebs_csi_driver_irsa" {
count = var.ebs_csi_driver ? 1 : 0
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "~> 5.37.1"
version = "~> 5.39.0"

role_name = "${var.cluster_name}-ebs-csi-role"
attach_ebs_csi_policy = true
Expand Down
2 changes: 1 addition & 1 deletion efs-csi.tf
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ resource "aws_efs_mount_target" "eks_efs_private" {
module "eks_efs_csi_driver_irsa" {
count = var.efs_csi_driver ? 1 : 0
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "~> 5.37.1"
version = "~> 5.39.0"

role_name = "${var.cluster_name}-efs-csi-driver-role"

Expand Down
2 changes: 1 addition & 1 deletion lb-controller.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
module "eks_lb_irsa" {
count = var.lb_controller ? 1 : 0
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "~> 5.37.1"
version = "~> 5.39.0"

role_name = "${var.cluster_name}-lb-role"
attach_load_balancer_controller_policy = true
Expand Down
3 changes: 2 additions & 1 deletion main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ locals {
# EKS Cluster
module "eks" { # tfsec:ignore:aws-ec2-no-public-egress-sgr tfsec:ignore:aws-eks-no-public-cluster-access tfsec:ignore:aws-eks-no-public-cluster-access-to-cidr
source = "terraform-aws-modules/eks/aws"
version = "~> 20.8.4"
version = "~> 20.8.5"

cluster_name = var.cluster_name
cluster_version = var.kubernetes_version
Expand Down Expand Up @@ -93,6 +93,7 @@ module "eks" { # tfsec:ignore:aws-ec2-no-public-egress-sgr tfsec:ignore:aws-eks-
create_kms_key = var.kms_manage ? false : true
enable_kms_key_rotation = var.kms_key_enable_rotation
kms_key_administrators = var.kms_key_administrators
kms_key_aliases = var.kms_key_aliases
kms_key_deletion_window_in_days = var.kms_key_deletion_window_in_days
kms_key_enable_default_policy = var.kms_key_enable_default_policy
kms_key_owners = var.kms_key_owners
Expand Down
2 changes: 1 addition & 1 deletion s3-csi.tf
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ module "eks_s3_csi_driver_irsa" {
count = var.s3_csi_driver ? 1 : 0

source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "~> 5.37.1"
version = "~> 5.39.0"

role_name = "${var.cluster_name}-s3-csi-driver-role"

Expand Down
16 changes: 8 additions & 8 deletions variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -199,18 +199,18 @@ variable "crossplane_values" {
default = {}
}

variable "crossplane_version" {
default = "1.15.2"
description = "Version of Crossplane Helm chart to install."
type = string
}

variable "crossplane_wait" {
description = "Wait for the Crossplane Helm chart installation to complete."
type = bool
default = true
}

variable "crossplane_version" {
default = "1.15.1"
description = "Version of Crossplane Helm chart to install."
type = string
}

# The ECR repository is not the same for every region, in particular
# those for govcloud:
# https://docs.aws.amazon.com/eks/latest/userguide/add-ons-images.html
Expand Down Expand Up @@ -305,7 +305,7 @@ variable "efs_csi_driver_values" {
}

variable "efs_csi_driver_version" {
default = "2.5.6"
default = "2.5.7"
description = "Version of the EFS CSI storage driver to install."
type = string
}
Expand Down Expand Up @@ -420,7 +420,7 @@ variable "karpenter_values" {
variable "karpenter_version" {
description = "Version of Karpenter Helm chart to install on the EKS cluster."
type = string
default = "0.35.2"
default = "0.36.0"
}

variable "karpenter_wait" {
Expand Down
2 changes: 1 addition & 1 deletion vpc-cni.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
module "eks_vpc_cni_irsa" {
count = var.vpc_cni ? 1 : 0
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "~> 5.37.1"
version = "~> 5.39.0"

role_name = "${var.cluster_name}-vpc-cni-role"

Expand Down
Loading