Skip to content
This repository was archived by the owner on Jun 12, 2024. It is now read-only.
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions docs/src/part-01.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Install [AWS CLI](https://aws.amazon.com/cli/) binary:
```bash
if ! command -v aws &> /dev/null; then
# renovate: datasource=github-tags depName=aws/aws-cli
AWSCLI_VERSION="2.11.27"
AWSCLI_VERSION="2.16.4"
curl -sL "https://awscli.amazonaws.com/awscli-exe-linux-x86_64-${AWSCLI_VERSION}.zip" -o "/tmp/awscli.zip"
unzip -q -o /tmp/awscli.zip -d /tmp/
sudo /tmp/aws/install
Expand All @@ -46,7 +46,7 @@ Install [kubectl](https://github.com/kubernetes/kubectl) binary:
```bash
if ! command -v kubectl &> /dev/null; then
# renovate: datasource=github-tags depName=kubernetes/kubectl extractVersion=^kubernetes-(?<version>.+)$
KUBECTL_VERSION="1.27.4"
KUBECTL_VERSION="1.30.1"
sudo curl -s -Lo /usr/local/bin/kubectl "https://storage.googleapis.com/kubernetes-release/release/v${KUBECTL_VERSION}/bin/$(uname | sed "s/./\L&/g")/amd64/kubectl"
sudo chmod a+x /usr/local/bin/kubectl
fi
Expand All @@ -57,7 +57,7 @@ Install [Helm](https://helm.sh/):
```bash
if ! command -v helm &> /dev/null; then
# renovate: datasource=github-tags depName=helm/helm
HELM_VERSION="3.12.3"
HELM_VERSION="3.15.1"
curl -s https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash -s -- --version "v${HELM_VERSION}"
fi
```
Expand All @@ -67,7 +67,7 @@ Install [kustomize](https://kustomize.io/):
```bash
if ! command -v kustomize &> /dev/null; then
# renovate: datasource=github-tags depName=kubernetes-sigs/kustomize extractVersion=^kustomize\/v(?<version>.+)$
KUSTOMIZE_VERSION="5.0.3"
KUSTOMIZE_VERSION="5.4.2"
curl -s "https://raw.githubusercontent.com/kubernetes-sigs/kustomize/master/hack/install_kustomize.sh" | sudo bash -s "${KUSTOMIZE_VERSION}" /usr/local/bin/
fi
```
Expand All @@ -78,7 +78,7 @@ Install [flux](https://fluxcd.io/):
if ! command -v flux &> /dev/null; then
# shellcheck disable=SC2034
# renovate: datasource=github-tags depName=fluxcd/flux2
FLUX_VERSION="0.41.2"
FLUX_VERSION="2.3.0"
curl -s https://fluxcd.io/install.sh | sudo -E bash
fi
```
Expand Down
24 changes: 12 additions & 12 deletions terraform/aws-mgmt/eks.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "4.0.2"
version = "5.8.1"

name = local.vpc_name
cidr = var.aws_vpc_cidr
Expand Down Expand Up @@ -65,7 +65,7 @@ resource "aws_route53_record" "base_domain" {

module "eks" {
source = "terraform-aws-modules/eks/aws"
version = "19.13.1"
version = "20.13.1"

cluster_name = local.cluster_name
cluster_version = var.cluster_version
Expand Down Expand Up @@ -128,7 +128,7 @@ module "eks" {
# Creates Karpenter native node termination handler resources and IAM instance profile
module "karpenter" {
source = "terraform-aws-modules/eks/aws//modules/karpenter"
version = "19.13.1"
version = "20.13.1"

cluster_name = module.eks.cluster_name
irsa_name = "${module.eks.cluster_name}-irsa-karpenter"
Expand Down Expand Up @@ -156,7 +156,7 @@ resource "kubernetes_annotations" "delete_default_storageclass" {

module "iam_assumable_role_aws_ebs_csi_driver" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.18.0"
version = "5.39.1"
create_role = true
provider_url = module.eks.cluster_oidc_issuer_url
role_name = "${module.eks.cluster_name}-irsa-aws-ebs-csi-driver"
Expand Down Expand Up @@ -203,7 +203,7 @@ resource "aws_iam_policy" "cert_manager" {

module "iam_assumable_role_cert_manager" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.18.0"
version = "5.39.1"
create_role = true
provider_url = module.eks.cluster_oidc_issuer_url
role_name = "${module.eks.cluster_name}-irsa-cert-manager"
Expand Down Expand Up @@ -245,7 +245,7 @@ resource "aws_iam_policy" "cnpg_db01" {

module "iam_assumable_role_cnpg_db01" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.18.0"
version = "5.39.1"
create_role = true
provider_url = module.eks.cluster_oidc_issuer_url
role_name = "${module.eks.cluster_name}-irsa-cnpg-db01"
Expand All @@ -259,7 +259,7 @@ module "iam_assumable_role_cnpg_db01" {

module "iam_assumable_role_crossplane_provider_aws" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.18.0"
version = "5.39.1"
create_role = true
provider_url = module.eks.cluster_oidc_issuer_url
role_name = "${module.eks.cluster_name}-irsa-crossplane-provider-aws"
Expand Down Expand Up @@ -308,7 +308,7 @@ resource "aws_iam_policy" "external_dns" {

module "iam_assumable_role_external_dns" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.18.0"
version = "5.39.1"
create_role = true
provider_url = module.eks.cluster_oidc_issuer_url
role_name = "${module.eks.cluster_name}-irsa-external-dns"
Expand Down Expand Up @@ -365,7 +365,7 @@ resource "aws_iam_policy" "kuard" {

module "iam_assumable_role_kuard" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.18.0"
version = "5.39.1"
create_role = true
provider_url = module.eks.cluster_oidc_issuer_url
role_name = "${module.eks.cluster_name}-irsa-kuard"
Expand Down Expand Up @@ -403,7 +403,7 @@ resource "aws_iam_policy" "kustomize_controller" {
# Role created by this module must be in stored in git in clusters/aws-dev-mgmt/<cluster_name>/flux/flux-system/kustomization.yaml
module "iam_assumable_role_kustomize_controller" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.18.0"
version = "5.39.1"
create_role = true
provider_url = module.eks.cluster_oidc_issuer_url
role_name = "${module.eks.cluster_name}-irsa-kustomize-controller"
Expand Down Expand Up @@ -457,7 +457,7 @@ resource "aws_iam_policy" "cluster_autoscaler" {
# Role created by this module must be in stored in git in clusters/aws-dev-mgmt/<cluster_name>/flux/flux-system/kustomization.yaml
module "iam_assumable_role_cluster_autoscaler" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.18.0"
version = "5.39.1"
create_role = true
provider_url = module.eks.cluster_oidc_issuer_url
role_name = "${module.eks.cluster_name}-irsa-cluster-autoscaler"
Expand Down Expand Up @@ -522,7 +522,7 @@ resource "aws_iam_policy" "velero_server" {

module "iam_assumable_role_velero_server" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version = "5.18.0"
version = "5.39.1"
create_role = true
provider_url = module.eks.cluster_oidc_issuer_url
role_name = "${module.eks.cluster_name}-irsa-velero-server"
Expand Down
14 changes: 7 additions & 7 deletions terraform/aws-mgmt/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,43 +4,43 @@ terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = "4.67.0"
version = "5.53.0"
}
git = {
source = "innovationnorway/git"
version = "0.1.3"
}
github = {
source = "integrations/github"
version = "5.25.1"
version = "6.2.1"
}
http = {
source = "hashicorp/http"
version = "3.3.0"
version = "3.4.3"
}
kubectl = {
source = "gavinbunney/kubectl"
version = "1.14.0"
}
kubernetes = {
source = "hashicorp/kubernetes"
version = "2.20.0"
version = "2.30.0"
}
local = {
source = "hashicorp/local"
version = "2.4.1"
version = "2.5.1"
}
null = {
source = "hashicorp/null"
version = "3.2.2"
}
random = {
source = "hashicorp/random"
version = "3.5.1"
version = "3.6.2"
}
time = {
source = "hashicorp/time"
version = "0.9.2"
version = "0.11.2"
}
tls = {
source = "hashicorp/tls"
Expand Down