Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion ebs_csi.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ locals {
module "aws_ebs_csi_pod_identity" {
count = local.enable_ebs_csi_driver ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "${local.name}-ebs-csi-driver"
attach_aws_ebs_csi_policy = true
Expand Down
2 changes: 1 addition & 1 deletion efs_csi.tf
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ locals {
module "aws_efs_csi_pod_identity" {
count = local.enable_efs_csi_driver ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "${local.name}-efs-csi-driver"
attach_aws_efs_csi_policy = true
Expand Down
4 changes: 2 additions & 2 deletions kubecosts.tf
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ module "kubecost_federated_bucket" {
module "kubecost_pod_identity" {
count = local.enable_kubecosts ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "kubecosts-${local.name}"
## The description for the iam role assumed by the Kubecost Platform
Expand Down Expand Up @@ -212,7 +212,7 @@ module "kubecost_pod_identity" {
module "kubecost_agent_pod_identity" {
count = local.enable_kubecosts_agent ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "${local.name}-kubecost-agent"
## The description for the role assumed by the Kubecost Agent
Expand Down
18 changes: 9 additions & 9 deletions pod_identity.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
module "pod_identity" {
for_each = var.pod_identity
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = each.value.name
description = try(each.value.description, null) != null ? try(each.value.description, null) : "Pod identity for the ${each.value.name} platform for the ${local.name} cluster"
Expand All @@ -31,7 +31,7 @@ module "pod_identity" {
module "aws_cert_manager_pod_identity" {
count = var.cert_manager.enable ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "cert-manager-${local.name}"
description = "Pod identity for cert-manager for the ${local.name} cluster"
Expand All @@ -58,7 +58,7 @@ module "aws_cert_manager_pod_identity" {
module "aws_external_dns_pod_identity" {
count = var.external_dns.enable ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "external-dns-${local.name}"
description = "Pod identity for external dns for the ${local.name} cluster"
Expand All @@ -85,7 +85,7 @@ module "aws_external_dns_pod_identity" {
module "aws_argocd_pod_identity" {
count = var.argocd.enable ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "argocd-pod-identity-${local.name}"
description = "Pod identity for argocd for the ${local.name} cluster"
Expand Down Expand Up @@ -123,7 +123,7 @@ module "aws_argocd_pod_identity" {
module "aws_terranetes_pod_identity" {
count = var.terranetes.enable ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "terranetes-${local.name}"
description = "Pod identity for the Terranetes platform for the ${local.name} cluster"
Expand All @@ -150,7 +150,7 @@ module "aws_terranetes_pod_identity" {
module "aws_external_secrets_pod_identity" {
count = var.external_secrets.enable ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "external-secrets-${local.name}"
description = "Pod identity for the External Secrets platform for the ${local.name} cluster"
Expand Down Expand Up @@ -179,7 +179,7 @@ module "aws_external_secrets_pod_identity" {
module "aws_ack_iam_pod_identity" {
count = var.aws_ack_iam.enable ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "ack-iam-${local.name}"
description = "Pod identity for the AWS ACK IAM platform for the ${local.name} cluster"
Expand All @@ -205,7 +205,7 @@ module "aws_ack_iam_pod_identity" {
module "aws_eks_ack_controller_pod_identity" {
count = var.aws_eks_ack.enable ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "eks-ack-controller-${local.name}"
description = "Pod identity for the AWS EKS ACK Controller for the ${local.name} cluster"
Expand Down Expand Up @@ -251,7 +251,7 @@ module "aws_eks_ack_controller_pod_identity" {
module "aws_cloudwatch_observability_pod_identity" {
count = var.cloudwatch_observability.enable ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

name = "cloudwatch-${local.name}"
description = "Pod identity for the CloudWatch Agent for the ${local.name} cluster"
Expand Down
2 changes: 1 addition & 1 deletion prometheus.tf
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
module "amazon_managed_service_prometheus_pod_identity" {
count = var.aws_prometheus.enable ? 1 : 0
source = "terraform-aws-modules/eks-pod-identity/aws"
version = "2.6.0"
version = "2.7.0"

amazon_managed_service_prometheus_policy_name = "${local.name}-aws-prometheus"
amazon_managed_service_prometheus_workspace_arns = var.aws_prometheus.workspaces
Expand Down
Loading