4
4
5
5
module "vpc" {
6
6
source = " terraform-aws-modules/vpc/aws"
7
- version = " 4.0.2 "
7
+ version = " 5.8.1 "
8
8
9
9
name = local. vpc_name
10
10
cidr = var. aws_vpc_cidr
@@ -65,7 +65,7 @@ resource "aws_route53_record" "base_domain" {
65
65
66
66
module "eks" {
67
67
source = " terraform-aws-modules/eks/aws"
68
- version = " 19.13 .1"
68
+ version = " 20.11 .1"
69
69
70
70
cluster_name = local. cluster_name
71
71
cluster_version = var. cluster_version
@@ -128,7 +128,7 @@ module "eks" {
128
128
# Creates Karpenter native node termination handler resources and IAM instance profile
129
129
module "karpenter" {
130
130
source = " terraform-aws-modules/eks/aws//modules/karpenter"
131
- version = " 19.13 .1"
131
+ version = " 20.11 .1"
132
132
133
133
cluster_name = module. eks . cluster_name
134
134
irsa_name = " ${ module . eks . cluster_name } -irsa-karpenter"
@@ -156,7 +156,7 @@ resource "kubernetes_annotations" "delete_default_storageclass" {
156
156
157
157
module "iam_assumable_role_aws_ebs_csi_driver" {
158
158
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
159
- version = " 5.18.0 "
159
+ version = " 5.39.1 "
160
160
create_role = true
161
161
provider_url = module. eks . cluster_oidc_issuer_url
162
162
role_name = " ${ module . eks . cluster_name } -irsa-aws-ebs-csi-driver"
@@ -203,7 +203,7 @@ resource "aws_iam_policy" "cert_manager" {
203
203
204
204
module "iam_assumable_role_cert_manager" {
205
205
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
206
- version = " 5.18.0 "
206
+ version = " 5.39.1 "
207
207
create_role = true
208
208
provider_url = module. eks . cluster_oidc_issuer_url
209
209
role_name = " ${ module . eks . cluster_name } -irsa-cert-manager"
@@ -245,7 +245,7 @@ resource "aws_iam_policy" "cnpg_db01" {
245
245
246
246
module "iam_assumable_role_cnpg_db01" {
247
247
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
248
- version = " 5.18.0 "
248
+ version = " 5.39.1 "
249
249
create_role = true
250
250
provider_url = module. eks . cluster_oidc_issuer_url
251
251
role_name = " ${ module . eks . cluster_name } -irsa-cnpg-db01"
@@ -259,7 +259,7 @@ module "iam_assumable_role_cnpg_db01" {
259
259
260
260
module "iam_assumable_role_crossplane_provider_aws" {
261
261
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
262
- version = " 5.18.0 "
262
+ version = " 5.39.1 "
263
263
create_role = true
264
264
provider_url = module. eks . cluster_oidc_issuer_url
265
265
role_name = " ${ module . eks . cluster_name } -irsa-crossplane-provider-aws"
@@ -308,7 +308,7 @@ resource "aws_iam_policy" "external_dns" {
308
308
309
309
module "iam_assumable_role_external_dns" {
310
310
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
311
- version = " 5.18.0 "
311
+ version = " 5.39.1 "
312
312
create_role = true
313
313
provider_url = module. eks . cluster_oidc_issuer_url
314
314
role_name = " ${ module . eks . cluster_name } -irsa-external-dns"
@@ -365,7 +365,7 @@ resource "aws_iam_policy" "kuard" {
365
365
366
366
module "iam_assumable_role_kuard" {
367
367
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
368
- version = " 5.18.0 "
368
+ version = " 5.39.1 "
369
369
create_role = true
370
370
provider_url = module. eks . cluster_oidc_issuer_url
371
371
role_name = " ${ module . eks . cluster_name } -irsa-kuard"
@@ -403,7 +403,7 @@ resource "aws_iam_policy" "kustomize_controller" {
403
403
# Role created by this module must be in stored in git in clusters/aws-dev-mgmt/<cluster_name>/flux/flux-system/kustomization.yaml
404
404
module "iam_assumable_role_kustomize_controller" {
405
405
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
406
- version = " 5.18.0 "
406
+ version = " 5.39.1 "
407
407
create_role = true
408
408
provider_url = module. eks . cluster_oidc_issuer_url
409
409
role_name = " ${ module . eks . cluster_name } -irsa-kustomize-controller"
@@ -457,7 +457,7 @@ resource "aws_iam_policy" "cluster_autoscaler" {
457
457
# Role created by this module must be in stored in git in clusters/aws-dev-mgmt/<cluster_name>/flux/flux-system/kustomization.yaml
458
458
module "iam_assumable_role_cluster_autoscaler" {
459
459
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
460
- version = " 5.18.0 "
460
+ version = " 5.39.1 "
461
461
create_role = true
462
462
provider_url = module. eks . cluster_oidc_issuer_url
463
463
role_name = " ${ module . eks . cluster_name } -irsa-cluster-autoscaler"
@@ -522,7 +522,7 @@ resource "aws_iam_policy" "velero_server" {
522
522
523
523
module "iam_assumable_role_velero_server" {
524
524
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
525
- version = " 5.18.0 "
525
+ version = " 5.39.1 "
526
526
create_role = true
527
527
provider_url = module. eks . cluster_oidc_issuer_url
528
528
role_name = " ${ module . eks . cluster_name } -irsa-velero-server"
0 commit comments