From 8c46121d8821d45c7c5a0c7d9107939a4b9d0e34 Mon Sep 17 00:00:00 2001 From: Bryant Biggs Date: Thu, 15 Dec 2022 18:01:11 -0500 Subject: [PATCH] feat: Add support for addon `configuration_values` --- README.md | 4 +- examples/complete/README.md | 4 +- examples/complete/versions.tf | 2 +- examples/eks_managed_node_group/README.md | 4 +- examples/eks_managed_node_group/main.tf | 7 + examples/eks_managed_node_group/versions.tf | 2 +- examples/fargate_profile/README.md | 11 +- examples/fargate_profile/main.tf | 142 +------------------ examples/fargate_profile/versions.tf | 2 +- examples/karpenter/README.md | 12 +- examples/karpenter/main.tf | 133 ++--------------- examples/karpenter/versions.tf | 2 +- examples/outposts/README.md | 4 +- examples/outposts/versions.tf | 2 +- examples/self_managed_node_group/README.md | 4 +- examples/self_managed_node_group/versions.tf | 2 +- main.tf | 1 + modules/eks-managed-node-group/README.md | 4 +- modules/eks-managed-node-group/versions.tf | 2 +- modules/fargate-profile/README.md | 4 +- modules/fargate-profile/versions.tf | 2 +- modules/karpenter/README.md | 4 +- modules/karpenter/versions.tf | 2 +- modules/self-managed-node-group/README.md | 4 +- modules/self-managed-node-group/versions.tf | 2 +- versions.tf | 2 +- 26 files changed, 57 insertions(+), 307 deletions(-) diff --git a/README.md b/README.md index a0d1fce5c2..234a4b2aff 100644 --- a/README.md +++ b/README.md @@ -223,7 +223,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | | [kubernetes](#requirement\_kubernetes) | >= 2.10 | | [tls](#requirement\_tls) | >= 3.0 | @@ -231,7 +231,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | | [kubernetes](#provider\_kubernetes) | >= 2.10 | | [tls](#provider\_tls) | >= 3.0 | diff --git a/examples/complete/README.md b/examples/complete/README.md index f6bac2e304..39b0eb3272 100644 --- a/examples/complete/README.md +++ b/examples/complete/README.md @@ -34,14 +34,14 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | | [kubernetes](#requirement\_kubernetes) | >= 2.10 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | ## Modules diff --git a/examples/complete/versions.tf b/examples/complete/versions.tf index f2f8625d4b..aeb892f359 100644 --- a/examples/complete/versions.tf +++ b/examples/complete/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } kubernetes = { source = "hashicorp/kubernetes" diff --git a/examples/eks_managed_node_group/README.md b/examples/eks_managed_node_group/README.md index ecb37f380c..45fa191c3e 100644 --- a/examples/eks_managed_node_group/README.md +++ b/examples/eks_managed_node_group/README.md @@ -58,14 +58,14 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | | [kubernetes](#requirement\_kubernetes) | >= 2.10 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | ## Modules diff --git a/examples/eks_managed_node_group/main.tf b/examples/eks_managed_node_group/main.tf index 378496c7f2..4cac1e8eda 100644 --- a/examples/eks_managed_node_group/main.tf +++ b/examples/eks_managed_node_group/main.tf @@ -64,6 +64,13 @@ module "eks" { vpc-cni = { most_recent = true service_account_role_arn = module.vpc_cni_irsa.iam_role_arn + configuration_values = jsonencode({ + env = { + # Reference docs https://docs.aws.amazon.com/eks/latest/userguide/cni-increase-ip-addresses.html + ENABLE_PREFIX_DELEGATION = true + WARM_PREFIX_TARGET = 1 + } + }) } } diff --git a/examples/eks_managed_node_group/versions.tf b/examples/eks_managed_node_group/versions.tf index f2f8625d4b..aeb892f359 100644 --- a/examples/eks_managed_node_group/versions.tf +++ b/examples/eks_managed_node_group/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } kubernetes = { source = "hashicorp/kubernetes" diff --git a/examples/fargate_profile/README.md b/examples/fargate_profile/README.md index 71a9ee7ad0..1b48556ce1 100644 --- a/examples/fargate_profile/README.md +++ b/examples/fargate_profile/README.md @@ -20,7 +20,7 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | | [helm](#requirement\_helm) | >= 2.7 | | [null](#requirement\_null) | >= 3.0 | @@ -28,9 +28,7 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | -| [helm](#provider\_helm) | >= 2.7 | -| [null](#provider\_null) | >= 3.0 | +| [aws](#provider\_aws) | >= 4.47 | ## Modules @@ -44,12 +42,7 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Type | |------|------| | [aws_iam_policy.additional](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource | -| [helm_release.coredns](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource | -| [null_resource.modify_kube_dns](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | -| [null_resource.remove_default_coredns_deployment](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | [aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones) | data source | -| [aws_eks_addon_version.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_addon_version) | data source | -| [aws_eks_cluster_auth.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_cluster_auth) | data source | ## Inputs diff --git a/examples/fargate_profile/main.tf b/examples/fargate_profile/main.tf index fa6c8bdb64..860ec55703 100644 --- a/examples/fargate_profile/main.tf +++ b/examples/fargate_profile/main.tf @@ -2,20 +2,6 @@ provider "aws" { region = local.region } -provider "helm" { - kubernetes { - host = module.eks.cluster_endpoint - cluster_ca_certificate = base64decode(module.eks.cluster_certificate_authority_data) - - exec { - api_version = "client.authentication.k8s.io/v1beta1" - command = "aws" - # This requires the awscli to be installed locally where Terraform is executed - args = ["eks", "get-token", "--cluster-name", module.eks.cluster_name] - } - } -} - data "aws_availability_zones" "available" {} locals { @@ -47,6 +33,11 @@ module "eks" { cluster_addons = { kube-proxy = {} vpc-cni = {} + coredns = { + configuration_values = jsonencode({ + computeType = "Fargate" + }) + } } vpc_id = module.vpc.vpc_id @@ -105,129 +96,6 @@ module "eks" { tags = local.tags } -################################################################################ -# Modify EKS CoreDNS Deployment -################################################################################ - -data "aws_eks_cluster_auth" "this" { - name = module.eks.cluster_name -} - -locals { - kubeconfig = yamlencode({ - apiVersion = "v1" - kind = "Config" - current-context = "terraform" - clusters = [{ - name = module.eks.cluster_name - cluster = { - certificate-authority-data = module.eks.cluster_certificate_authority_data - server = module.eks.cluster_endpoint - } - }] - contexts = [{ - name = "terraform" - context = { - cluster = module.eks.cluster_name - user = "terraform" - } - }] - users = [{ - name = "terraform" - user = { - token = data.aws_eks_cluster_auth.this.token - } - }] - }) -} - -# Separate resource so that this is only ever executed once -resource "null_resource" "remove_default_coredns_deployment" { - triggers = {} - - provisioner "local-exec" { - interpreter = ["/bin/bash", "-c"] - environment = { - KUBECONFIG = base64encode(local.kubeconfig) - } - - # We are removing the deployment provided by the EKS service and replacing it through the self-managed CoreDNS Helm addon - # However, we are maintaining the existing kube-dns service and annotating it for Helm to assume control - command = <<-EOT - kubectl --namespace kube-system delete deployment coredns --kubeconfig <(echo $KUBECONFIG | base64 --decode) - EOT - } -} - -resource "null_resource" "modify_kube_dns" { - triggers = {} - - provisioner "local-exec" { - interpreter = ["/bin/bash", "-c"] - environment = { - KUBECONFIG = base64encode(local.kubeconfig) - } - - # We are maintaining the existing kube-dns service and annotating it for Helm to assume control - command = <<-EOT - echo "Setting implicit dependency on ${module.eks.fargate_profiles["kube_system"].fargate_profile_pod_execution_role_arn}" - kubectl --namespace kube-system annotate --overwrite service kube-dns meta.helm.sh/release-name=coredns --kubeconfig <(echo $KUBECONFIG | base64 --decode) - kubectl --namespace kube-system annotate --overwrite service kube-dns meta.helm.sh/release-namespace=kube-system --kubeconfig <(echo $KUBECONFIG | base64 --decode) - kubectl --namespace kube-system label --overwrite service kube-dns app.kubernetes.io/managed-by=Helm --kubeconfig <(echo $KUBECONFIG | base64 --decode) - EOT - } - - depends_on = [ - null_resource.remove_default_coredns_deployment - ] -} - -################################################################################ -# CoreDNS Helm Chart (self-managed) -################################################################################ - -data "aws_eks_addon_version" "this" { - for_each = toset(["coredns"]) - - addon_name = each.value - kubernetes_version = module.eks.cluster_version - most_recent = true -} - -resource "helm_release" "coredns" { - name = "coredns" - namespace = "kube-system" - create_namespace = false - description = "CoreDNS is a DNS server that chains plugins and provides Kubernetes DNS Services" - chart = "coredns" - version = "1.19.4" - repository = "https://coredns.github.io/helm" - - # For EKS image repositories https://docs.aws.amazon.com/eks/latest/userguide/add-ons-images.html - values = [ - <<-EOT - image: - repository: 602401143452.dkr.ecr.eu-west-1.amazonaws.com/eks/coredns - tag: ${data.aws_eks_addon_version.this["coredns"].version} - deployment: - name: coredns - annotations: - eks.amazonaws.com/compute-type: fargate - service: - name: kube-dns - annotations: - eks.amazonaws.com/compute-type: fargate - podAnnotations: - eks.amazonaws.com/compute-type: fargate - EOT - ] - - depends_on = [ - # Need to ensure the CoreDNS updates are performed before provisioning - null_resource.modify_kube_dns - ] -} - ################################################################################ # Supporting Resources ################################################################################ diff --git a/examples/fargate_profile/versions.tf b/examples/fargate_profile/versions.tf index 69ef526bd9..17db7d8988 100644 --- a/examples/fargate_profile/versions.tf +++ b/examples/fargate_profile/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } helm = { source = "hashicorp/helm" diff --git a/examples/karpenter/README.md b/examples/karpenter/README.md index f5d4e2dcc3..3335cfc4b3 100644 --- a/examples/karpenter/README.md +++ b/examples/karpenter/README.md @@ -52,7 +52,7 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | | [helm](#requirement\_helm) | >= 2.7 | | [kubectl](#requirement\_kubectl) | >= 1.14 | | [kubernetes](#requirement\_kubernetes) | >= 2.10 | @@ -62,11 +62,10 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | -| [aws.virginia](#provider\_aws.virginia) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | +| [aws.virginia](#provider\_aws.virginia) | >= 4.47 | | [helm](#provider\_helm) | >= 2.7 | | [kubectl](#provider\_kubectl) | >= 1.14 | -| [null](#provider\_null) | >= 3.0 | ## Modules @@ -80,17 +79,12 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Type | |------|------| -| [helm_release.coredns](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource | | [helm_release.karpenter](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource | | [kubectl_manifest.karpenter_example_deployment](https://registry.terraform.io/providers/gavinbunney/kubectl/latest/docs/resources/manifest) | resource | | [kubectl_manifest.karpenter_node_template](https://registry.terraform.io/providers/gavinbunney/kubectl/latest/docs/resources/manifest) | resource | | [kubectl_manifest.karpenter_provisioner](https://registry.terraform.io/providers/gavinbunney/kubectl/latest/docs/resources/manifest) | resource | -| [null_resource.modify_kube_dns](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | -| [null_resource.remove_default_coredns_deployment](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | [aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones) | data source | | [aws_ecrpublic_authorization_token.token](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ecrpublic_authorization_token) | data source | -| [aws_eks_addon_version.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_addon_version) | data source | -| [aws_eks_cluster_auth.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_cluster_auth) | data source | ## Inputs diff --git a/examples/karpenter/main.tf b/examples/karpenter/main.tf index eeb44ac0fc..66674706fb 100644 --- a/examples/karpenter/main.tf +++ b/examples/karpenter/main.tf @@ -78,6 +78,16 @@ module "eks" { cluster_version = local.cluster_version cluster_endpoint_public_access = true + cluster_addons = { + kube-proxy = {} + vpc-cni = {} + coredns = { + configuration_values = jsonencode({ + computeType = "Fargate" + }) + } + } + vpc_id = module.vpc.vpc_id subnet_ids = module.vpc.private_subnets control_plane_subnet_ids = module.vpc.intra_subnets @@ -245,129 +255,6 @@ resource "kubectl_manifest" "karpenter_example_deployment" { ] } -################################################################################ -# Modify EKS CoreDNS Deployment -################################################################################ - -data "aws_eks_cluster_auth" "this" { - name = module.eks.cluster_name -} - -locals { - kubeconfig = yamlencode({ - apiVersion = "v1" - kind = "Config" - current-context = "terraform" - clusters = [{ - name = module.eks.cluster_name - cluster = { - certificate-authority-data = module.eks.cluster_certificate_authority_data - server = module.eks.cluster_endpoint - } - }] - contexts = [{ - name = "terraform" - context = { - cluster = module.eks.cluster_name - user = "terraform" - } - }] - users = [{ - name = "terraform" - user = { - token = data.aws_eks_cluster_auth.this.token - } - }] - }) -} - -# Separate resource so that this is only ever executed once -resource "null_resource" "remove_default_coredns_deployment" { - triggers = {} - - provisioner "local-exec" { - interpreter = ["/bin/bash", "-c"] - environment = { - KUBECONFIG = base64encode(local.kubeconfig) - } - - # We are removing the deployment provided by the EKS service and replacing it through the self-managed CoreDNS Helm addon - # However, we are maintaining the existing kube-dns service and annotating it for Helm to assume control - command = <<-EOT - kubectl --namespace kube-system delete deployment coredns --kubeconfig <(echo $KUBECONFIG | base64 --decode) - EOT - } -} - -resource "null_resource" "modify_kube_dns" { - triggers = {} - - provisioner "local-exec" { - interpreter = ["/bin/bash", "-c"] - environment = { - KUBECONFIG = base64encode(local.kubeconfig) - } - - # We are maintaining the existing kube-dns service and annotating it for Helm to assume control - command = <<-EOT - echo "Setting implicit dependency on ${module.eks.fargate_profiles["kube_system"].fargate_profile_pod_execution_role_arn}" - kubectl --namespace kube-system annotate --overwrite service kube-dns meta.helm.sh/release-name=coredns --kubeconfig <(echo $KUBECONFIG | base64 --decode) - kubectl --namespace kube-system annotate --overwrite service kube-dns meta.helm.sh/release-namespace=kube-system --kubeconfig <(echo $KUBECONFIG | base64 --decode) - kubectl --namespace kube-system label --overwrite service kube-dns app.kubernetes.io/managed-by=Helm --kubeconfig <(echo $KUBECONFIG | base64 --decode) - EOT - } - - depends_on = [ - null_resource.remove_default_coredns_deployment - ] -} - -################################################################################ -# CoreDNS Helm Chart (self-managed) -################################################################################ - -data "aws_eks_addon_version" "this" { - for_each = toset(["coredns"]) - - addon_name = each.value - kubernetes_version = module.eks.cluster_version - most_recent = true -} - -resource "helm_release" "coredns" { - name = "coredns" - namespace = "kube-system" - create_namespace = false - description = "CoreDNS is a DNS server that chains plugins and provides Kubernetes DNS Services" - chart = "coredns" - version = "1.19.4" - repository = "https://coredns.github.io/helm" - - # For EKS image repositories https://docs.aws.amazon.com/eks/latest/userguide/add-ons-images.html - values = [ - <<-EOT - image: - repository: 602401143452.dkr.ecr.eu-west-1.amazonaws.com/eks/coredns - tag: ${data.aws_eks_addon_version.this["coredns"].version} - deployment: - name: coredns - annotations: - eks.amazonaws.com/compute-type: fargate - service: - name: kube-dns - annotations: - eks.amazonaws.com/compute-type: fargate - podAnnotations: - eks.amazonaws.com/compute-type: fargate - EOT - ] - - depends_on = [ - # Need to ensure the CoreDNS updates are performed before provisioning - null_resource.modify_kube_dns - ] -} - ################################################################################ # Supporting Resources ################################################################################ diff --git a/examples/karpenter/versions.tf b/examples/karpenter/versions.tf index 7ae5250dce..cab7b21121 100644 --- a/examples/karpenter/versions.tf +++ b/examples/karpenter/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } kubernetes = { source = "hashicorp/kubernetes" diff --git a/examples/outposts/README.md b/examples/outposts/README.md index 20b60fd4e9..33684940ac 100644 --- a/examples/outposts/README.md +++ b/examples/outposts/README.md @@ -42,14 +42,14 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | | [kubernetes](#requirement\_kubernetes) | >= 2.10 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | | [kubernetes](#provider\_kubernetes) | >= 2.10 | ## Modules diff --git a/examples/outposts/versions.tf b/examples/outposts/versions.tf index f2f8625d4b..aeb892f359 100644 --- a/examples/outposts/versions.tf +++ b/examples/outposts/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } kubernetes = { source = "hashicorp/kubernetes" diff --git a/examples/self_managed_node_group/README.md b/examples/self_managed_node_group/README.md index 97deaa59ab..9d78d228b9 100644 --- a/examples/self_managed_node_group/README.md +++ b/examples/self_managed_node_group/README.md @@ -26,14 +26,14 @@ Note that this example may create resources which cost money. Run `terraform des | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | | [kubernetes](#requirement\_kubernetes) | >= 2.10 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | ## Modules diff --git a/examples/self_managed_node_group/versions.tf b/examples/self_managed_node_group/versions.tf index f2f8625d4b..aeb892f359 100644 --- a/examples/self_managed_node_group/versions.tf +++ b/examples/self_managed_node_group/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } kubernetes = { source = "hashicorp/kubernetes" diff --git a/main.tf b/main.tf index 0001d55f6c..7566db516f 100644 --- a/main.tf +++ b/main.tf @@ -375,6 +375,7 @@ resource "aws_eks_addon" "this" { addon_name = try(each.value.name, each.key) addon_version = try(each.value.addon_version, data.aws_eks_addon_version.this[each.key].version) + configuration_values = try(each.value.configuration_values, null) preserve = try(each.value.preserve, null) resolve_conflicts = try(each.value.resolve_conflicts, "OVERWRITE") service_account_role_arn = try(each.value.service_account_role_arn, null) diff --git a/modules/eks-managed-node-group/README.md b/modules/eks-managed-node-group/README.md index d4d4cc9b40..f05c31d5f6 100644 --- a/modules/eks-managed-node-group/README.md +++ b/modules/eks-managed-node-group/README.md @@ -65,13 +65,13 @@ module "eks_managed_node_group" { | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | ## Modules diff --git a/modules/eks-managed-node-group/versions.tf b/modules/eks-managed-node-group/versions.tf index 325eee94e1..55eff62b09 100644 --- a/modules/eks-managed-node-group/versions.tf +++ b/modules/eks-managed-node-group/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } } } diff --git a/modules/fargate-profile/README.md b/modules/fargate-profile/README.md index 4ed9a6fd2d..cc0bab2a5b 100644 --- a/modules/fargate-profile/README.md +++ b/modules/fargate-profile/README.md @@ -29,13 +29,13 @@ module "fargate_profile" { | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | ## Modules diff --git a/modules/fargate-profile/versions.tf b/modules/fargate-profile/versions.tf index 325eee94e1..55eff62b09 100644 --- a/modules/fargate-profile/versions.tf +++ b/modules/fargate-profile/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } } } diff --git a/modules/karpenter/README.md b/modules/karpenter/README.md index 71f4ff9455..eaf04f6554 100644 --- a/modules/karpenter/README.md +++ b/modules/karpenter/README.md @@ -100,13 +100,13 @@ module "karpenter" { | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | ## Modules diff --git a/modules/karpenter/versions.tf b/modules/karpenter/versions.tf index 325eee94e1..55eff62b09 100644 --- a/modules/karpenter/versions.tf +++ b/modules/karpenter/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } } } diff --git a/modules/self-managed-node-group/README.md b/modules/self-managed-node-group/README.md index 051aa4f4eb..f16a2514ea 100644 --- a/modules/self-managed-node-group/README.md +++ b/modules/self-managed-node-group/README.md @@ -43,13 +43,13 @@ module "self_managed_node_group" { | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0 | -| [aws](#requirement\_aws) | >= 4.45 | +| [aws](#requirement\_aws) | >= 4.47 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 4.45 | +| [aws](#provider\_aws) | >= 4.47 | ## Modules diff --git a/modules/self-managed-node-group/versions.tf b/modules/self-managed-node-group/versions.tf index 325eee94e1..55eff62b09 100644 --- a/modules/self-managed-node-group/versions.tf +++ b/modules/self-managed-node-group/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } } } diff --git a/versions.tf b/versions.tf index fdc407c2ed..5da3d23ea7 100644 --- a/versions.tf +++ b/versions.tf @@ -4,7 +4,7 @@ terraform { required_providers { aws = { source = "hashicorp/aws" - version = ">= 4.45" + version = ">= 4.47" } tls = { source = "hashicorp/tls"