Skip to content

Commit

Permalink
Merge pull request #1224 from alphagov/renovate/terraform-aws-modules…
Browse files Browse the repository at this point in the history
…-iam-aws-5.x

Update Terraform terraform-aws-modules/iam/aws to v5
  • Loading branch information
samsimpson1 authored Apr 11, 2024
2 parents adfad4d + 60b415c commit 8ca714d
Show file tree
Hide file tree
Showing 7 changed files with 7 additions and 7 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ locals {

module "aws_ebs_csi_driver_iam_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "~> 4.0"
version = "~> 5.0"
create_role = true
role_name = "${local.ebs_csi_driver_controller_service_account_name}-${var.cluster_name}"
role_description = "Role for the AWS EBS CSI driver controller. Corresponds to ${local.ebs_csi_driver_controller_service_account_name} k8s ServiceAccount."
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ locals {

module "aws_lb_controller_iam_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "~> 4.0"
version = "~> 5.0"
create_role = true
role_name = "${local.aws_lb_controller_service_account_name}-${var.cluster_name}"
role_description = "Role for the AWS Load Balancer Controller. Corresponds to ${local.aws_lb_controller_service_account_name} k8s ServiceAccount."
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ locals {
# in order to comply with the licence.
module "cluster_autoscaler_iam_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "~> 4.0"
version = "~> 5.0"
create_role = true
role_name = "${local.cluster_autoscaler_service_account_name}-${var.cluster_name}"
role_description = "Role for Cluster Autoscaler. Corresponds to ${local.cluster_autoscaler_service_account_name} k8s ServiceAccount."
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ locals {

module "external_dns_iam_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "~> 4.0"
version = "~> 5.0"
create_role = true
role_name = "${local.external_dns_service_account_name}-${var.cluster_name}"
role_description = "Role for External DNS addon. Corresponds to ${local.external_dns_service_account_name} k8s ServiceAccount."
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ locals {

module "external_secrets_iam_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "~> 4.0"
version = "~> 5.0"
create_role = true
role_name = "${local.external_secrets_service_account_name}-${var.cluster_name}"
role_description = "Role for External Secrets addon. Corresponds to ${local.external_secrets_service_account_name} k8s ServiceAccount."
Expand Down
2 changes: 1 addition & 1 deletion terraform/deployments/cluster-infrastructure/grafana.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ locals {

module "grafana_iam_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "~> 4.0"
version = "~> 5.0"
create_role = true
role_name = "${local.grafana_service_account}-${module.eks.cluster_name}"
role_description = "Role for Grafana to access AWS data sources. Corresponds to ${local.grafana_service_account} k8s ServiceAccount."
Expand Down
2 changes: 1 addition & 1 deletion terraform/deployments/datagovuk-infrastructure/ckan_iam.tf
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

module "ckan_iam_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "~> 4.0"
version = "~> 5.0"
create_role = true
role_name = "${var.ckan_service_account_name}-${local.cluster_id}"
role_description = "Role for CKAN S3 access. Corresponds to ${var.ckan_service_account_namespace}/${var.ckan_service_account_name} k8s ServiceAccount."
Expand Down

0 comments on commit 8ca714d

Please sign in to comment.