Skip to content

Commit c2c5751

Browse files
Merge pull request #154 from Ensono/feat/bump-aws-6
feat: upgrades aws modules to the 6.x aws provider
2 parents 4f6f6d7 + 4be689e commit c2c5751

File tree

27 files changed

+130
-137
lines changed

27 files changed

+130
-137
lines changed

aws/modules/infrastructure_modules/container_registry/examples/main.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,6 @@ module "ecr_repositories" {
2222
max_tagged_image_count = 100
2323

2424
enable_registry_scanning = true
25+
26+
tags = {}
2527
}

aws/modules/infrastructure_modules/container_registry/main.tf

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ module "ecr" {
33
for_each = toset(concat(var.repositories, flatten([for k, v in var.pull_through_cache_setup : [for v in v.images : "${k}/${v}"]])))
44

55
source = "terraform-aws-modules/ecr/aws"
6-
version = "1.6.0"
6+
version = "3.0.0"
77

88
create_repository = true
99

@@ -81,7 +81,7 @@ module "ecr_pull_through_cache" {
8181
count = length(var.pull_through_cache_setup) > 0 ? 1 : 0
8282

8383
source = "terraform-aws-modules/ecr/aws"
84-
version = "1.6.0"
84+
version = "3.0.0"
8585

8686
create_repository = false
8787

@@ -103,7 +103,7 @@ module "ecr_registry_scanning_rules" {
103103
count = var.enable_registry_scanning ? 1 : 0
104104

105105
source = "terraform-aws-modules/ecr/aws"
106-
version = "1.6.0"
106+
version = "3.0.0"
107107

108108
create_repository = false
109109

@@ -112,8 +112,13 @@ module "ecr_registry_scanning_rules" {
112112
registry_scan_rules = [
113113
{
114114
scan_frequency = "CONTINUOUS_SCAN"
115-
filter = "*"
116-
filter_type = "WILDCARD"
115+
116+
filter = [
117+
{
118+
filter = "*"
119+
filter_type = "WILDCARD"
120+
},
121+
]
117122
}
118123
]
119124

aws/modules/infrastructure_modules/container_registry/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = "> 5.0"
7+
version = ">= 6.0"
88
}
99
}
1010
}

aws/modules/infrastructure_modules/eks/eks-cluster.tf renamed to aws/modules/infrastructure_modules/eks/eks_cluster.tf

Lines changed: 12 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -17,44 +17,36 @@ module "eks_kms_key" {
1717
#############
1818
module "eks" {
1919
source = "terraform-aws-modules/eks/aws"
20-
version = "~> 20.19"
20+
version = "~> 21.0.9"
2121

22-
vpc_id = var.vpc_id
23-
subnet_ids = var.vpc_private_subnets
24-
cluster_name = var.cluster_name
25-
cluster_version = var.cluster_version
26-
enable_irsa = true
27-
cluster_endpoint_private_access = var.cluster_endpoint_private_access
28-
cluster_endpoint_public_access = var.cluster_endpoint_public_access
22+
vpc_id = var.vpc_id
23+
subnet_ids = var.vpc_private_subnets
24+
name = var.cluster_name
25+
kubernetes_version = var.cluster_version
26+
enable_irsa = true
27+
endpoint_private_access = var.cluster_endpoint_private_access
28+
endpoint_public_access = var.cluster_endpoint_public_access
2929

30-
cluster_security_group_additional_rules = var.cluster_security_group_additional_rules
30+
security_group_additional_rules = var.cluster_security_group_additional_rules
3131

3232
node_security_group_additional_rules = var.node_security_group_additional_rules
3333
node_security_group_enable_recommended_rules = var.node_security_group_enable_recommended_rules
3434

35-
cluster_enabled_log_types = var.cluster_enabled_log_types
35+
enabled_log_types = var.cluster_enabled_log_types
3636

37-
cluster_addons = local.cluster_addons
37+
addons = local.cluster_addons
3838

3939
create_kms_key = var.create_kms_key
4040
kms_key_administrators = var.trusted_role_arn == "" ? [] : ["${data.aws_caller_identity.this.arn}", "${var.trusted_role_arn}"]
4141

42-
cluster_encryption_config = {
42+
encryption_config = {
4343
resources = ["secrets"]
4444
provider_key_arn = module.eks_kms_key.arn
4545
}
4646

4747
authentication_mode = "API_AND_CONFIG_MAP"
4848
enable_cluster_creator_admin_permissions = var.cluster_creator_admin_permissions
4949

50-
eks_managed_node_group_defaults = {
51-
disk_size = 50
52-
block_device_mappings = var.block_device_mappings
53-
placement = {
54-
tenancy = var.eks_node_tenancy
55-
}
56-
}
57-
5850
eks_managed_node_groups = local.eks_managed_node_groups
5951

6052
tags = var.tags

aws/modules/infrastructure_modules/eks/examples/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ module "eks" {
2424

2525
# EKS Cluster Configuration
2626
cluster_name = "example-cluster"
27-
cluster_version = "1.27"
2827
eks_desired_nodes = 1
2928
eks_node_size = "t3.small"
3029
cluster_endpoint_public_access = true

aws/modules/infrastructure_modules/eks/locals.tf

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,19 @@ locals {
1111
)
1212
} : {}
1313

14-
cluster_addons = merge(local.cluster_container_insights_addon)
14+
cluster_addons = merge(
15+
{
16+
coredns = {}
17+
eks-pod-identity-agent = {
18+
before_compute = true
19+
}
20+
kube-proxy = {}
21+
vpc-cni = {
22+
before_compute = true
23+
}
24+
},
25+
local.cluster_container_insights_addon,
26+
)
1527

1628
eks_bootstrap_extra_args = <<-EOT
1729
[settings.kernel]
@@ -51,7 +63,6 @@ locals {
5163

5264
eks_bottlerocket_base_node_config = {
5365
ami_type = "BOTTLEROCKET_x86_64"
54-
platform = "bottlerocket"
5566
use_name_prefix = true
5667
ebs_optimized = true
5768

@@ -79,6 +90,14 @@ locals {
7990
iam_role_arn = local.create_node_iam_role ? aws_iam_role.node["general-${v}"].arn : null # As
8091
subnet_ids = [var.vpc_private_subnets[k]]
8192

93+
# `disk_size` is ignored by Bottlerocket at this time...
94+
# disk_size = 50
95+
block_device_mappings = var.block_device_mappings
96+
97+
placement = {
98+
tenancy = var.eks_node_tenancy
99+
}
100+
82101
instance_types = [var.eks_node_size]
83102
}
84103
)

aws/modules/infrastructure_modules/eks/variables.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ variable "cluster_version" {
2929
type = string
3030
description = "Cluster Kubernetes Version"
3131

32-
default = 1.30
32+
default = 1.32
3333
}
3434

3535
variable "cluster_endpoint_private_access" {
@@ -73,7 +73,7 @@ variable "cluster_addon_container_insights_config" {
7373
description = "The configuration for the Container Insights Addon 'amazon-cloudwatch-observability'. Addon version is is tied to the Kubernetes Version. See: `aws eks describe-addon-versions --kubernetes-version <version> --addon-name 'amazon-cloudwatch-observability'` for available versions"
7474

7575
default = {
76-
addon_version = "v1.8.0-eksbuild.1"
76+
addon_version = "v4.3.0-eksbuild.1"
7777
}
7878
}
7979

aws/modules/infrastructure_modules/eks/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = ">= 5.0"
7+
version = ">= 6.0"
88
}
99
}
1010
}

aws/modules/infrastructure_modules/eks_irsa/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = ">= 5.0"
7+
version = ">= 6.0"
88
}
99
}
1010
}

aws/modules/infrastructure_modules/secret_manager/example/constraints.tf

Lines changed: 0 additions & 10 deletions
This file was deleted.

0 commit comments

Comments
 (0)