Skip to content

Commit fa41ef6

Browse files
Update missing dependencies (#19)
We missed updating some dependencies in the recent changes to support AWS v5.
1 parent 6b231e2 commit fa41ef6

File tree

3 files changed

+64
-36
lines changed

3 files changed

+64
-36
lines changed

README.md

Lines changed: 58 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -87,42 +87,52 @@ module "production_v1" {
8787
| Name | Version |
8888
|------|---------|
8989
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.4.2 |
90-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 4.0 |
90+
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.0 |
9191
| <a name="requirement_random"></a> [random](#requirement\_random) | ~> 3.0 |
9292

9393
## Providers
9494

9595
| Name | Version |
9696
|------|---------|
97-
| <a name="provider_aws"></a> [aws](#provider\_aws) | ~> 4.0 |
97+
| <a name="provider_aws"></a> [aws](#provider\_aws) | ~> 5.0 |
9898
| <a name="provider_random"></a> [random](#provider\_random) | ~> 3.0 |
9999

100100
## Modules
101101

102102
| Name | Source | Version |
103103
|------|--------|---------|
104-
| <a name="module_cluster"></a> [cluster](#module\_cluster) | github.com/thoughtbot/flightdeck//aws/cluster-name | v0.9.0 |
105-
| <a name="module_deploy_role"></a> [deploy\_role](#module\_deploy\_role) | github.com/thoughtbot/terraform-eks-cicd//modules/github-actions-eks-deploy-role | v0.2.0 |
106-
| <a name="module_developer_managed_secrets"></a> [developer\_managed\_secrets](#module\_developer\_managed\_secrets) | github.com/thoughtbot/terraform-aws-secrets//user-managed-secret | v0.5.0 |
107-
| <a name="module_network"></a> [network](#module\_network) | github.com/thoughtbot/flightdeck//aws/network-data | v0.9.0 |
108-
| <a name="module_pod_policy"></a> [pod\_policy](#module\_pod\_policy) | github.com/thoughtbot/flightdeck//aws/service-account-policy | v0.9.0 |
109-
| <a name="module_pod_role"></a> [pod\_role](#module\_pod\_role) | github.com/thoughtbot/flightdeck//aws/service-account-role | v0.9.0 |
110-
| <a name="module_postgres"></a> [postgres](#module\_postgres) | github.com/thoughtbot/terraform-aws-databases//rds-postgres/primary-instance | v0.4.0 |
111-
| <a name="module_postgres_admin_login"></a> [postgres\_admin\_login](#module\_postgres\_admin\_login) | github.com/thoughtbot/terraform-aws-databases//rds-postgres/admin-login | v0.4.0 |
112-
| <a name="module_redis"></a> [redis](#module\_redis) | github.com/thoughtbot/terraform-aws-databases//elasticache-redis/replication-group | v0.4.0 |
113-
| <a name="module_redis_token"></a> [redis\_token](#module\_redis\_token) | github.com/thoughtbot/terraform-aws-databases//elasticache-redis/auth-token | v0.4.0 |
114-
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | github.com/thoughtbot/terraform-s3-bucket | v0.3.0 |
115-
| <a name="module_secret_key"></a> [secret\_key](#module\_secret\_key) | github.com/thoughtbot/terraform-aws-secrets//random-secret | v0.6.0 |
116-
| <a name="module_secrets_policy"></a> [secrets\_policy](#module\_secrets\_policy) | github.com/thoughtbot/terraform-aws-secrets//read-secret-policy | v0.6.0 |
117-
| <a name="module_sentry_dsn"></a> [sentry\_dsn](#module\_sentry\_dsn) | github.com/thoughtbot/terraform-aws-sentry-dsn | v0.3.0 |
118-
| <a name="module_sso_roles"></a> [sso\_roles](#module\_sso\_roles) | github.com/thoughtbot/terraform-aws-sso-permission-set-roles | v0.2.0 |
104+
| <a name="module_cluster"></a> [cluster](#module\_cluster) | github.com/thoughtbot/flightdeck//aws/cluster-name | v0.12.1 |
105+
| <a name="module_deploy_role"></a> [deploy\_role](#module\_deploy\_role) | github.com/thoughtbot/terraform-eks-cicd//modules/github-actions-eks-deploy-role | v0.3.0 |
106+
| <a name="module_developer_managed_secrets"></a> [developer\_managed\_secrets](#module\_developer\_managed\_secrets) | github.com/thoughtbot/terraform-aws-secrets//user-managed-secret | v0.8.0 |
107+
| <a name="module_developer_managed_secrets_policy"></a> [developer\_managed\_secrets\_policy](#module\_developer\_managed\_secrets\_policy) | github.com/thoughtbot/terraform-aws-secrets//read-secret-policy | v0.8.0 |
108+
| <a name="module_es_pod_policy"></a> [es\_pod\_policy](#module\_es\_pod\_policy) | github.com/thoughtbot/flightdeck//aws/service-account-policy | v0.12.1 |
109+
| <a name="module_network"></a> [network](#module\_network) | github.com/thoughtbot/flightdeck//aws/network-data | v0.12.1 |
110+
| <a name="module_opensearch"></a> [opensearch](#module\_opensearch) | ./modules/opensearch | n/a |
111+
| <a name="module_pod_policy"></a> [pod\_policy](#module\_pod\_policy) | github.com/thoughtbot/flightdeck//aws/service-account-policy | v0.12.1 |
112+
| <a name="module_pod_role"></a> [pod\_role](#module\_pod\_role) | github.com/thoughtbot/flightdeck//aws/service-account-role | v0.12.1 |
113+
| <a name="module_postgres"></a> [postgres](#module\_postgres) | github.com/thoughtbot/terraform-aws-databases//rds-postgres/primary-instance | v0.6.0 |
114+
| <a name="module_postgres_admin_login"></a> [postgres\_admin\_login](#module\_postgres\_admin\_login) | github.com/thoughtbot/terraform-aws-databases//rds-postgres/admin-login | v0.6.0 |
115+
| <a name="module_postgres_policy"></a> [postgres\_policy](#module\_postgres\_policy) | github.com/thoughtbot/terraform-aws-secrets//read-secret-policy | v0.8.0 |
116+
| <a name="module_redis"></a> [redis](#module\_redis) | github.com/thoughtbot/terraform-aws-databases//elasticache-redis/replication-group | v0.6.0 |
117+
| <a name="module_redis_policy"></a> [redis\_policy](#module\_redis\_policy) | github.com/thoughtbot/terraform-aws-secrets//read-secret-policy | v0.8.0 |
118+
| <a name="module_redis_token"></a> [redis\_token](#module\_redis\_token) | github.com/thoughtbot/terraform-aws-databases//elasticache-redis/auth-token | v0.6.0 |
119+
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | github.com/thoughtbot/terraform-s3-bucket | v0.4.0 |
120+
| <a name="module_secret_key"></a> [secret\_key](#module\_secret\_key) | github.com/thoughtbot/terraform-aws-secrets//random-secret | v0.8.0 |
121+
| <a name="module_secret_key_policy"></a> [secret\_key\_policy](#module\_secret\_key\_policy) | github.com/thoughtbot/terraform-aws-secrets//read-secret-policy | v0.8.0 |
122+
| <a name="module_sentry_dsn"></a> [sentry\_dsn](#module\_sentry\_dsn) | github.com/thoughtbot/terraform-aws-sentry-dsn | v0.4.0 |
123+
| <a name="module_sso_roles"></a> [sso\_roles](#module\_sso\_roles) | github.com/thoughtbot/terraform-aws-sso-permission-set-roles | v0.3.0 |
119124

120125
## Resources
121126

122127
| Name | Type |
123128
|------|------|
129+
| [aws_iam_service_linked_role.elasticsearch](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_service_linked_role) | resource |
124130
| [random_id.parameter_group](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/id) | resource |
131+
| [random_password.es](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/password) | resource |
132+
| [aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones) | data source |
133+
| [aws_iam_policy_document.ecs_osis_access](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
125134
| [aws_iam_role.execution](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_role) | data source |
135+
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source |
126136
| [aws_ssm_parameter.prometheus_workspace_id](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ssm_parameter) | data source |
127137

128138
## Inputs
@@ -132,44 +142,62 @@ module "production_v1" {
132142
| <a name="input_cluster_names"></a> [cluster\_names](#input\_cluster\_names) | Names of EKS clusters for application | `list(string)` | n/a | yes |
133143
| <a name="input_deploy_role_name"></a> [deploy\_role\_name](#input\_deploy\_role\_name) | Override the name of the deploy role | `string` | `null` | no |
134144
| <a name="input_developer_managed_secrets"></a> [developer\_managed\_secrets](#input\_developer\_managed\_secrets) | Secrets managed manually by developers | `map(list(string))` | `{}` | no |
145+
| <a name="input_elasticsearch_enabled"></a> [elasticsearch\_enabled](#input\_elasticsearch\_enabled) | Set to true to enable creation of the Elasticsearch database | `bool` | `false` | no |
146+
| <a name="input_es_admin_principals"></a> [es\_admin\_principals](#input\_es\_admin\_principals) | Principals allowed to peform admin actions (default: current account) | `list(string)` | `null` | no |
147+
| <a name="input_es_application_name"></a> [es\_application\_name](#input\_es\_application\_name) | Unique name for the opensearch instance | `string` | `""` | no |
148+
| <a name="input_es_dedicated_master_type"></a> [es\_dedicated\_master\_type](#input\_es\_dedicated\_master\_type) | Instance type of the dedicated main nodes in the cluster. | `string` | n/a | yes |
149+
| <a name="input_es_ebs_iops"></a> [es\_ebs\_iops](#input\_es\_ebs\_iops) | Baseline input/output (I/O) performance of EBS volumes attached to data nodes | `number` | `3000` | no |
150+
| <a name="input_es_engine_version"></a> [es\_engine\_version](#input\_es\_engine\_version) | Version of Elasticsearch to deploy. | `string` | n/a | yes |
151+
| <a name="input_es_instance_count"></a> [es\_instance\_count](#input\_es\_instance\_count) | Number of instances in the cluster | `number` | `2` | no |
152+
| <a name="input_es_instance_type"></a> [es\_instance\_type](#input\_es\_instance\_type) | Instance type of data nodes in the cluster. | `string` | `""` | no |
153+
| <a name="input_es_read_principals"></a> [es\_read\_principals](#input\_es\_read\_principals) | Principals allowed to read the secret (default: current account) | `list(string)` | `null` | no |
154+
| <a name="input_es_volume_size"></a> [es\_volume\_size](#input\_es\_volume\_size) | Size of EBS volumes attached to data nodes (in GiB). | `number` | `100` | no |
155+
| <a name="input_es_volume_type"></a> [es\_volume\_type](#input\_es\_volume\_type) | Type of EBS volumes attached to data nodes. | `string` | `"gp3"` | no |
135156
| <a name="input_execution_role_arns"></a> [execution\_role\_arns](#input\_execution\_role\_arns) | ARNs of execution roles allowed to manage this application | `list(string)` | `[]` | no |
136157
| <a name="input_execution_role_names"></a> [execution\_role\_names](#input\_execution\_role\_names) | Names of execution roles allowed to manage this application | `list(string)` | <pre>[<br> "terraform-execution"<br>]</pre> | no |
158+
| <a name="input_generate_secret_key"></a> [generate\_secret\_key](#input\_generate\_secret\_key) | Set to true to generate a secret key for the application | `bool` | `false` | no |
137159
| <a name="input_github_branches"></a> [github\_branches](#input\_github\_branches) | GitHub branches allowed to deploy to this instance | `list(string)` | n/a | yes |
138160
| <a name="input_github_iam_oidc_provider_arn"></a> [github\_iam\_oidc\_provider\_arn](#input\_github\_iam\_oidc\_provider\_arn) | ARN for the GitHub Actions IAM OIDC provider | `string` | n/a | yes |
139161
| <a name="input_github_organization"></a> [github\_organization](#input\_github\_organization) | GitHub organization allowed to deploy to this instance | `string` | n/a | yes |
140162
| <a name="input_github_repository"></a> [github\_repository](#input\_github\_repository) | GitHub repository allowed to deploy to this instance | `string` | n/a | yes |
141163
| <a name="input_name"></a> [name](#input\_name) | Name of this application | `string` | n/a | yes |
142164
| <a name="input_postgres_admin_username"></a> [postgres\_admin\_username](#input\_postgres\_admin\_username) | Username for the admin user | `string` | `"postgres"` | no |
143-
| <a name="input_postgres_allocated_storage"></a> [postgres\_allocated\_storage](#input\_postgres\_allocated\_storage) | Size in GB for the database instance | `number` | n/a | yes |
165+
| <a name="input_postgres_allocated_storage"></a> [postgres\_allocated\_storage](#input\_postgres\_allocated\_storage) | Size in GB for the database instance | `number` | `null` | no |
144166
| <a name="input_postgres_apply_immediately"></a> [postgres\_apply\_immediately](#input\_postgres\_apply\_immediately) | Set to true to immediately apply changes and cause downtime | `bool` | `false` | no |
145167
| <a name="input_postgres_default_database"></a> [postgres\_default\_database](#input\_postgres\_default\_database) | Name of the default database | `string` | `"postgres"` | no |
146168
| <a name="input_postgres_enabled"></a> [postgres\_enabled](#input\_postgres\_enabled) | Set to true to enable creation of the Postgres database | `bool` | `false` | no |
147-
| <a name="input_postgres_engine_version"></a> [postgres\_engine\_version](#input\_postgres\_engine\_version) | Version for RDS database engine | `string` | n/a | yes |
148-
| <a name="input_postgres_identifier"></a> [postgres\_identifier](#input\_postgres\_identifier) | Unique identifier for this database | `string` | n/a | yes |
149-
| <a name="input_postgres_instance_class"></a> [postgres\_instance\_class](#input\_postgres\_instance\_class) | Tier for the database instance | `string` | n/a | yes |
150-
| <a name="input_postgres_max_allocated_storage"></a> [postgres\_max\_allocated\_storage](#input\_postgres\_max\_allocated\_storage) | Maximum size GB after autoscaling | `number` | n/a | yes |
169+
| <a name="input_postgres_engine_version"></a> [postgres\_engine\_version](#input\_postgres\_engine\_version) | Version for RDS database engine | `string` | `null` | no |
170+
| <a name="input_postgres_identifier"></a> [postgres\_identifier](#input\_postgres\_identifier) | Unique identifier for this database | `string` | `null` | no |
171+
| <a name="input_postgres_instance_class"></a> [postgres\_instance\_class](#input\_postgres\_instance\_class) | Tier for the database instance | `string` | `null` | no |
172+
| <a name="input_postgres_max_allocated_storage"></a> [postgres\_max\_allocated\_storage](#input\_postgres\_max\_allocated\_storage) | Maximum size GB after autoscaling | `number` | `null` | no |
151173
| <a name="input_postgres_storage_encrypted"></a> [postgres\_storage\_encrypted](#input\_postgres\_storage\_encrypted) | Set to false to disable encryption at rest | `bool` | `true` | no |
152174
| <a name="input_prometheus_workspace_name"></a> [prometheus\_workspace\_name](#input\_prometheus\_workspace\_name) | Name of the AMP workspace to which metrics will be written | `string` | `null` | no |
175+
| <a name="input_read_permission_sets"></a> [read\_permission\_sets](#input\_read\_permission\_sets) | AWS IAM permission sets allowed to read application data | `list(string)` | `[]` | no |
176+
| <a name="input_readwrite_permission_sets"></a> [readwrite\_permission\_sets](#input\_readwrite\_permission\_sets) | AWS IAM permission sets allowed to read and write application data | `list(string)` | `[]` | no |
153177
| <a name="input_redis_enabled"></a> [redis\_enabled](#input\_redis\_enabled) | Set to true to enable creation of a Redis instance | `bool` | `false` | no |
154-
| <a name="input_redis_name"></a> [redis\_name](#input\_redis\_name) | Name of the ElastiCache instance for Redis | `string` | n/a | yes |
155-
| <a name="input_redis_node_type"></a> [redis\_node\_type](#input\_redis\_node\_type) | Node type for the ElastiCache instance for Redis | `string` | n/a | yes |
156-
| <a name="input_redis_replica_count"></a> [redis\_replica\_count](#input\_redis\_replica\_count) | Number of replicas for the Redis cluster | `number` | n/a | yes |
157-
| <a name="input_s3_bucket_name"></a> [s3\_bucket\_name](#input\_s3\_bucket\_name) | Name of the S3 bucket for ActiveStorage uploads | `string` | n/a | yes |
178+
| <a name="input_redis_name"></a> [redis\_name](#input\_redis\_name) | Name of the ElastiCache instance for Redis | `string` | `null` | no |
179+
| <a name="input_redis_node_type"></a> [redis\_node\_type](#input\_redis\_node\_type) | Node type for the ElastiCache instance for Redis | `string` | `null` | no |
180+
| <a name="input_redis_replica_count"></a> [redis\_replica\_count](#input\_redis\_replica\_count) | Number of replicas for the Redis cluster | `number` | `null` | no |
181+
| <a name="input_s3_bucket_name"></a> [s3\_bucket\_name](#input\_s3\_bucket\_name) | Name of the S3 bucket for this application | `string` | `null` | no |
158182
| <a name="input_s3_enabled"></a> [s3\_enabled](#input\_s3\_enabled) | Set to true to enable creation of an S3 bucket | `bool` | `false` | no |
159-
| <a name="input_s3_read_principals"></a> [s3\_read\_principals](#input\_s3\_read\_principals) | Additional principals able to read S3 data | `list(string)` | n/a | yes |
160-
| <a name="input_s3_readwrite_principals"></a> [s3\_readwrite\_principals](#input\_s3\_readwrite\_principals) | Additional principals able to read and write S3 data | `list(string)` | n/a | yes |
183+
| <a name="input_s3_read_principals"></a> [s3\_read\_principals](#input\_s3\_read\_principals) | Additional principals able to read S3 data | `list(string)` | `[]` | no |
184+
| <a name="input_s3_readwrite_principals"></a> [s3\_readwrite\_principals](#input\_s3\_readwrite\_principals) | Additional principals able to read and write S3 data | `list(string)` | `[]` | no |
161185
| <a name="input_secret_key_variable"></a> [secret\_key\_variable](#input\_secret\_key\_variable) | Name of the environment variable for the application secret key | `string` | `"SECRET_KEY_BASE"` | no |
162-
| <a name="input_sentry_organization"></a> [sentry\_organization](#input\_sentry\_organization) | Slug of the Sentry organization | `string` | n/a | yes |
163-
| <a name="input_sentry_project"></a> [sentry\_project](#input\_sentry\_project) | Slug of the Sentry project | `string` | n/a | yes |
186+
| <a name="input_secret_permission_sets"></a> [secret\_permission\_sets](#input\_secret\_permission\_sets) | AWS IAM permission sets allow to read and manage secrets | `list(string)` | `[]` | no |
187+
| <a name="input_sentry_enabled"></a> [sentry\_enabled](#input\_sentry\_enabled) | Set to true to enable creation of a Sentry DSN | `bool` | `false` | no |
188+
| <a name="input_sentry_organization"></a> [sentry\_organization](#input\_sentry\_organization) | Slug of the Sentry organization | `string` | `null` | no |
189+
| <a name="input_sentry_project"></a> [sentry\_project](#input\_sentry\_project) | Slug of the Sentry project | `string` | `null` | no |
164190
| <a name="input_service_account_name"></a> [service\_account\_name](#input\_service\_account\_name) | Name of the Kubernetes service account for the application | `string` | `null` | no |
165191
| <a name="input_stage"></a> [stage](#input\_stage) | Software development lifecycle stage for this tenant | `string` | n/a | yes |
192+
| <a name="input_tags"></a> [tags](#input\_tags) | Tags to apply to the instance in AWS | `map(string)` | `{}` | no |
166193

167194
## Outputs
168195

169196
| Name | Description |
170197
|------|-------------|
171198
| <a name="output_deploy_role_arn"></a> [deploy\_role\_arn](#output\_deploy\_role\_arn) | ARN of the IAM role for deploying to this Kubernetes namespace |
172199
| <a name="output_deploy_role_name"></a> [deploy\_role\_name](#output\_deploy\_role\_name) | Name of the IAM role for deploying to this Kubernetes namespace |
200+
| <a name="output_developer_managed_secrets"></a> [developer\_managed\_secrets](#output\_developer\_managed\_secrets) | SecretsManager environment variables managed by developers |
173201
| <a name="output_namespace"></a> [namespace](#output\_namespace) | Kubernetes namespace to which this application deploys |
174202
| <a name="output_pod_role_arn"></a> [pod\_role\_arn](#output\_pod\_role\_arn) | ARN of the IAM role for Kubernetes pods |
175203
| <a name="output_secrets_manager_secrets"></a> [secrets\_manager\_secrets](#output\_secrets\_manager\_secrets) | SecretsManager environment variables |

0 commit comments

Comments
 (0)