diff --git a/manifests/.workshop/terraform/base.tf b/manifests/.workshop/terraform/base.tf index 5ce0cf719e..864072457b 100644 --- a/manifests/.workshop/terraform/base.tf +++ b/manifests/.workshop/terraform/base.tf @@ -8,11 +8,11 @@ terraform { } kubernetes = { source = "hashicorp/kubernetes" - version = "2.38.0" + version = "3.0.1" } helm = { source = "hashicorp/helm" - version = "2.17.0" + version = "3.1.1" } kubectl = { source = "gavinbunney/kubectl" diff --git a/manifests/modules/aiml/inferentia/.workshop/terraform/main.tf b/manifests/modules/aiml/inferentia/.workshop/terraform/main.tf index dc72d179f4..fbb07eca7f 100644 --- a/manifests/modules/aiml/inferentia/.workshop/terraform/main.tf +++ b/manifests/modules/aiml/inferentia/.workshop/terraform/main.tf @@ -105,7 +105,7 @@ resource "aws_s3_bucket" "inference" { module "iam_assumable_role_inference" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-inference" provider_url = var.addon_context.eks_oidc_issuer_url diff --git a/manifests/modules/aiml/q-cli/.workshop/terraform/main.tf b/manifests/modules/aiml/q-cli/.workshop/terraform/main.tf index 540fe66d3f..9615dc04c4 100644 --- a/manifests/modules/aiml/q-cli/.workshop/terraform/main.tf +++ b/manifests/modules/aiml/q-cli/.workshop/terraform/main.tf @@ -159,7 +159,7 @@ resource "aws_eks_addon" "pod_identity" { module "iam_assumable_role_carts" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role" - version = "5.60.0" + version = "6.2.3" create_role = true role_requires_mfa = false role_name = "${var.addon_context.eks_cluster_id}-carts-dynamo" diff --git a/manifests/modules/automation/continuousdelivery/codepipeline/.workshop/terraform/main.tf b/manifests/modules/automation/continuousdelivery/codepipeline/.workshop/terraform/main.tf index 01cc52ecda..224633069b 100644 --- a/manifests/modules/automation/continuousdelivery/codepipeline/.workshop/terraform/main.tf +++ b/manifests/modules/automation/continuousdelivery/codepipeline/.workshop/terraform/main.tf @@ -256,7 +256,7 @@ resource "aws_kms_key" "artifact_encryption_key" { module "iam_assumable_role_ui" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-ecr-ui" provider_url = var.addon_context.eks_oidc_issuer_url diff --git a/manifests/modules/automation/controlplanes/ack/.workshop/terraform/main.tf b/manifests/modules/automation/controlplanes/ack/.workshop/terraform/main.tf index 5e6884f8f7..a27f26ce43 100644 --- a/manifests/modules/automation/controlplanes/ack/.workshop/terraform/main.tf +++ b/manifests/modules/automation/controlplanes/ack/.workshop/terraform/main.tf @@ -22,7 +22,7 @@ data "aws_ecrpublic_authorization_token" "token" { module "iam_assumable_role_carts" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-carts-ack" provider_url = var.addon_context.eks_oidc_issuer_url @@ -82,7 +82,7 @@ EOF module "iam_assumable_role_ack" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-ack-controller" provider_url = var.addon_context.eks_oidc_issuer_url diff --git a/manifests/modules/automation/controlplanes/crossplane/.workshop/terraform/main.tf b/manifests/modules/automation/controlplanes/crossplane/.workshop/terraform/main.tf index 6b364198c1..cf4400e297 100644 --- a/manifests/modules/automation/controlplanes/crossplane/.workshop/terraform/main.tf +++ b/manifests/modules/automation/controlplanes/crossplane/.workshop/terraform/main.tf @@ -42,7 +42,7 @@ locals { module "upbound_irsa_aws" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" role_name_prefix = "${var.addon_context.eks_cluster_id}-ddb-upbound-" policy_name_prefix = "${var.addon_context.eks_cluster_id}-ddb-upbound-" @@ -102,7 +102,7 @@ resource "kubectl_manifest" "upbound_aws_provider_config" { module "iam_assumable_role_carts" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-carts-crossplane" provider_url = var.addon_context.eks_oidc_issuer_url diff --git a/manifests/modules/automation/gitops/argocd/.workshop/terraform/main.tf b/manifests/modules/automation/gitops/argocd/.workshop/terraform/main.tf index b7c5ceb80f..9361c0cc3e 100644 --- a/manifests/modules/automation/gitops/argocd/.workshop/terraform/main.tf +++ b/manifests/modules/automation/gitops/argocd/.workshop/terraform/main.tf @@ -1,6 +1,6 @@ module "ebs_csi_driver_irsa" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" diff --git a/manifests/modules/automation/gitops/flux/.workshop/terraform/main.tf b/manifests/modules/automation/gitops/flux/.workshop/terraform/main.tf index b7c5ceb80f..9361c0cc3e 100644 --- a/manifests/modules/automation/gitops/flux/.workshop/terraform/main.tf +++ b/manifests/modules/automation/gitops/flux/.workshop/terraform/main.tf @@ -1,6 +1,6 @@ module "ebs_csi_driver_irsa" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" diff --git a/manifests/modules/autoscaling/workloads/keda/.workshop/terraform/main.tf b/manifests/modules/autoscaling/workloads/keda/.workshop/terraform/main.tf index fac389d094..0adb96035c 100644 --- a/manifests/modules/autoscaling/workloads/keda/.workshop/terraform/main.tf +++ b/manifests/modules/autoscaling/workloads/keda/.workshop/terraform/main.tf @@ -20,7 +20,7 @@ module "eks_blueprints_addons" { module "iam_assumable_role_keda" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-keda" provider_url = var.addon_context.eks_oidc_issuer_url diff --git a/manifests/modules/fundamentals/storage/ebs/.workshop/terraform/main.tf b/manifests/modules/fundamentals/storage/ebs/.workshop/terraform/main.tf index fe7c4b7efb..ca4d9e9364 100644 --- a/manifests/modules/fundamentals/storage/ebs/.workshop/terraform/main.tf +++ b/manifests/modules/fundamentals/storage/ebs/.workshop/terraform/main.tf @@ -1,6 +1,6 @@ module "ebs_csi_driver_irsa" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" diff --git a/manifests/modules/fundamentals/storage/efs/.workshop/terraform/main.tf b/manifests/modules/fundamentals/storage/efs/.workshop/terraform/main.tf index 75902155ce..18e111fe7e 100644 --- a/manifests/modules/fundamentals/storage/efs/.workshop/terraform/main.tf +++ b/manifests/modules/fundamentals/storage/efs/.workshop/terraform/main.tf @@ -1,6 +1,6 @@ module "efs_csi_driver_irsa" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" role_name_prefix = "${var.addon_context.eks_cluster_id}-efs-csi-" policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" diff --git a/manifests/modules/fundamentals/storage/fsxz/.workshop/terraform/main.tf b/manifests/modules/fundamentals/storage/fsxz/.workshop/terraform/main.tf index b1fef9a6b9..508e3e7f0c 100644 --- a/manifests/modules/fundamentals/storage/fsxz/.workshop/terraform/main.tf +++ b/manifests/modules/fundamentals/storage/fsxz/.workshop/terraform/main.tf @@ -1,7 +1,7 @@ # Create FSxZ OIDC providers module "fsxz_oidc_providers" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" # Create prefixes role_name_prefix = "${var.addon_context.eks_cluster_id}-fsxz-csi-" @@ -145,7 +145,7 @@ resource "aws_security_group_rule" "fsxz_egress" { module "iam_assumable_role_fsx" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-fsxz" provider_url = var.addon_context.eks_oidc_issuer_url diff --git a/manifests/modules/fundamentals/storage/s3/.workshop/terraform/main.tf b/manifests/modules/fundamentals/storage/s3/.workshop/terraform/main.tf index 9bfd3117f5..ac852d497d 100644 --- a/manifests/modules/fundamentals/storage/s3/.workshop/terraform/main.tf +++ b/manifests/modules/fundamentals/storage/s3/.workshop/terraform/main.tf @@ -8,7 +8,7 @@ resource "aws_s3_bucket" "mountpoint_s3" { # Create S3 CSI Driver IAM Role and associated policy module "mountpoint_s3_csi_driver_irsa" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" # Create prefixes role_name_prefix = "${var.addon_context.eks_cluster_id}-s3-csi-" diff --git a/manifests/modules/networking/vpc-lattice/.workshop/terraform/main.tf b/manifests/modules/networking/vpc-lattice/.workshop/terraform/main.tf index 3110a03a33..bbaaf4e303 100644 --- a/manifests/modules/networking/vpc-lattice/.workshop/terraform/main.tf +++ b/manifests/modules/networking/vpc-lattice/.workshop/terraform/main.tf @@ -19,7 +19,7 @@ module "eks_blueprints_addons" { module "iam_assumable_role_lattice" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-lattice" provider_url = var.addon_context.eks_oidc_issuer_url diff --git a/manifests/modules/observability/container-insights/.workshop/terraform/main.tf b/manifests/modules/observability/container-insights/.workshop/terraform/main.tf index 5b3aa0eeae..492f1295de 100644 --- a/manifests/modules/observability/container-insights/.workshop/terraform/main.tf +++ b/manifests/modules/observability/container-insights/.workshop/terraform/main.tf @@ -82,7 +82,7 @@ module "opentelemetry_operator" { module "iam_assumable_role_adot_ci" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-adot-collector-ci" provider_url = var.addon_context.eks_oidc_issuer_url diff --git a/manifests/modules/observability/kubecost/.workshop/terraform/main.tf b/manifests/modules/observability/kubecost/.workshop/terraform/main.tf index 32fff6c908..638663acfc 100644 --- a/manifests/modules/observability/kubecost/.workshop/terraform/main.tf +++ b/manifests/modules/observability/kubecost/.workshop/terraform/main.tf @@ -1,6 +1,6 @@ module "ebs_csi_driver_irsa" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" diff --git a/manifests/modules/observability/oss-metrics/.workshop/terraform/main.tf b/manifests/modules/observability/oss-metrics/.workshop/terraform/main.tf index 256ade6845..3d30c0c463 100644 --- a/manifests/modules/observability/oss-metrics/.workshop/terraform/main.tf +++ b/manifests/modules/observability/oss-metrics/.workshop/terraform/main.tf @@ -2,7 +2,7 @@ data "aws_partition" "current" {} module "ebs_csi_driver_irsa" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" role_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" policy_name_prefix = "${var.addon_context.eks_cluster_id}-ebs-csi-" @@ -115,7 +115,7 @@ resource "aws_prometheus_workspace" "this" { module "iam_assumable_role_adot" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-adot-collector" diff --git a/manifests/modules/security/eks-pod-identity/.workshop/terraform/main.tf b/manifests/modules/security/eks-pod-identity/.workshop/terraform/main.tf index 70371a1828..433ee2c95c 100644 --- a/manifests/modules/security/eks-pod-identity/.workshop/terraform/main.tf +++ b/manifests/modules/security/eks-pod-identity/.workshop/terraform/main.tf @@ -92,7 +92,7 @@ resource "aws_dynamodb_table" "carts" { module "iam_assumable_role_carts" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role" - version = "5.60.0" + version = "6.2.3" create_role = true role_requires_mfa = false role_name = "${var.addon_context.eks_cluster_id}-carts-dynamo" diff --git a/manifests/modules/security/irsa/.workshop/terraform/main.tf b/manifests/modules/security/irsa/.workshop/terraform/main.tf index 08afdfc4b2..eb75d00bec 100644 --- a/manifests/modules/security/irsa/.workshop/terraform/main.tf +++ b/manifests/modules/security/irsa/.workshop/terraform/main.tf @@ -92,7 +92,7 @@ resource "aws_dynamodb_table" "carts" { module "iam_assumable_role_carts" { source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc" - version = "5.60.0" + version = "6.2.3" create_role = true role_name = "${var.addon_context.eks_cluster_id}-carts-dynamo" provider_url = var.addon_context.eks_oidc_issuer_url diff --git a/manifests/modules/security/secrets-manager/.workshop/terraform/main.tf b/manifests/modules/security/secrets-manager/.workshop/terraform/main.tf index 5336898af8..773190081c 100644 --- a/manifests/modules/security/secrets-manager/.workshop/terraform/main.tf +++ b/manifests/modules/security/secrets-manager/.workshop/terraform/main.tf @@ -52,7 +52,7 @@ module "eks_blueprints_addons" { module "secrets_manager_role" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.60.0" + version = "6.2.3" role_name_prefix = "${var.eks_cluster_id}-secrets-" policy_name_prefix = "${var.eks_cluster_id}-secrets-"