diff --git a/terraform/deployments/cluster-infrastructure/aws_ebs_csi_iam.tf b/terraform/deployments/cluster-infrastructure/aws_ebs_csi_iam.tf index c466e9099..25fa648a4 100644 --- a/terraform/deployments/cluster-infrastructure/aws_ebs_csi_iam.tf +++ b/terraform/deployments/cluster-infrastructure/aws_ebs_csi_iam.tf @@ -4,7 +4,7 @@ locals { module "aws_ebs_csi_driver_iam_role" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "~> 4.0" + version = "~> 5.0" create_role = true role_name = "${local.ebs_csi_driver_controller_service_account_name}-${var.cluster_name}" role_description = "Role for the AWS EBS CSI driver controller. Corresponds to ${local.ebs_csi_driver_controller_service_account_name} k8s ServiceAccount." diff --git a/terraform/deployments/cluster-infrastructure/aws_lb_controller_iam.tf b/terraform/deployments/cluster-infrastructure/aws_lb_controller_iam.tf index 9a697307c..69994426e 100644 --- a/terraform/deployments/cluster-infrastructure/aws_lb_controller_iam.tf +++ b/terraform/deployments/cluster-infrastructure/aws_lb_controller_iam.tf @@ -11,7 +11,7 @@ locals { module "aws_lb_controller_iam_role" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "~> 4.0" + version = "~> 5.0" create_role = true role_name = "${local.aws_lb_controller_service_account_name}-${var.cluster_name}" role_description = "Role for the AWS Load Balancer Controller. Corresponds to ${local.aws_lb_controller_service_account_name} k8s ServiceAccount." diff --git a/terraform/deployments/cluster-infrastructure/cluster_autoscaler_iam.tf b/terraform/deployments/cluster-infrastructure/cluster_autoscaler_iam.tf index 8eb302300..1eb0f2cb4 100644 --- a/terraform/deployments/cluster-infrastructure/cluster_autoscaler_iam.tf +++ b/terraform/deployments/cluster-infrastructure/cluster_autoscaler_iam.tf @@ -22,7 +22,7 @@ locals { # in order to comply with the licence. module "cluster_autoscaler_iam_role" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "~> 4.0" + version = "~> 5.0" create_role = true role_name = "${local.cluster_autoscaler_service_account_name}-${var.cluster_name}" role_description = "Role for Cluster Autoscaler. Corresponds to ${local.cluster_autoscaler_service_account_name} k8s ServiceAccount." diff --git a/terraform/deployments/cluster-infrastructure/external_dns.tf b/terraform/deployments/cluster-infrastructure/external_dns.tf index 47274ce52..0cc1f356f 100644 --- a/terraform/deployments/cluster-infrastructure/external_dns.tf +++ b/terraform/deployments/cluster-infrastructure/external_dns.tf @@ -13,7 +13,7 @@ locals { module "external_dns_iam_role" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "~> 4.0" + version = "~> 5.0" create_role = true role_name = "${local.external_dns_service_account_name}-${var.cluster_name}" role_description = "Role for External DNS addon. Corresponds to ${local.external_dns_service_account_name} k8s ServiceAccount." diff --git a/terraform/deployments/cluster-infrastructure/external_secrets_iam.tf b/terraform/deployments/cluster-infrastructure/external_secrets_iam.tf index 9eb9971de..9d354fef1 100644 --- a/terraform/deployments/cluster-infrastructure/external_secrets_iam.tf +++ b/terraform/deployments/cluster-infrastructure/external_secrets_iam.tf @@ -10,7 +10,7 @@ locals { module "external_secrets_iam_role" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "~> 4.0" + version = "~> 5.0" create_role = true role_name = "${local.external_secrets_service_account_name}-${var.cluster_name}" role_description = "Role for External Secrets addon. Corresponds to ${local.external_secrets_service_account_name} k8s ServiceAccount." diff --git a/terraform/deployments/cluster-infrastructure/grafana.tf b/terraform/deployments/cluster-infrastructure/grafana.tf index 024fc7df8..ca3ffcc40 100644 --- a/terraform/deployments/cluster-infrastructure/grafana.tf +++ b/terraform/deployments/cluster-infrastructure/grafana.tf @@ -5,7 +5,7 @@ locals { module "grafana_iam_role" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "~> 4.0" + version = "~> 5.0" create_role = true role_name = "${local.grafana_service_account}-${module.eks.cluster_name}" role_description = "Role for Grafana to access AWS data sources. Corresponds to ${local.grafana_service_account} k8s ServiceAccount." diff --git a/terraform/deployments/datagovuk-infrastructure/ckan_iam.tf b/terraform/deployments/datagovuk-infrastructure/ckan_iam.tf index 830a72637..d53efa0aa 100644 --- a/terraform/deployments/datagovuk-infrastructure/ckan_iam.tf +++ b/terraform/deployments/datagovuk-infrastructure/ckan_iam.tf @@ -1,7 +1,7 @@ module "ckan_iam_role" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "~> 4.0" + version = "~> 5.0" create_role = true role_name = "${var.ckan_service_account_name}-${local.cluster_id}" role_description = "Role for CKAN S3 access. Corresponds to ${var.ckan_service_account_namespace}/${var.ckan_service_account_name} k8s ServiceAccount."