From 10ece3280cdd1c3430cc8df0e51cd0c3741d274e Mon Sep 17 00:00:00 2001 From: Bryant Biggs Date: Fri, 17 Jun 2022 16:41:22 -0400 Subject: [PATCH] fix: Upgrade K8s auth API due to deprecation --- .github/workflows/e2e-parallel-destroy.yml | 4 ++-- .github/workflows/e2e-parallel-full.yml | 4 ++-- .github/workflows/e2e-terratest.yml | 6 +++--- .github/workflows/markdown-link-check.yml | 4 +++- .github/workflows/plan-examples.yml | 8 ++++---- .github/workflows/pre-commit.yaml | 7 ++++--- examples/analytics/emr-on-eks/main.tf | 4 ++-- examples/analytics/spark-k8s-operator/main.tf | 4 ++-- examples/aws-efs-csi-driver/main.tf | 4 ++-- examples/ci-cd/gitlab-ci-cd/main.tf | 4 ++-- examples/complete-kubernetes-addons/main.tf | 4 ++-- examples/crossplane/main.tf | 6 +++--- examples/eks-cluster-with-external-dns/main.tf | 4 ++-- examples/eks-cluster-with-new-vpc/main.tf | 4 ++-- examples/fargate-serverless/main.tf | 4 ++-- examples/fully-private-eks-cluster/main.tf | 2 +- examples/game-tech/agones-game-controller/main.tf | 4 ++-- examples/gitops/argocd/main.tf | 4 ++-- examples/ingress-controllers/nginx/main.tf | 4 ++-- examples/ipv6-eks-cluster/main.tf | 4 ++-- examples/karpenter/main.tf | 6 +++--- examples/multi-tenancy-with-teams/main.tf | 6 +++--- examples/node-groups/fargate-profiles/main.tf | 2 +- examples/node-groups/managed-node-groups/main.tf | 4 ++-- examples/node-groups/self-managed-node-groups/main.tf | 4 ++-- examples/node-groups/windows-node-groups/main.tf | 4 ++-- .../observability/adot-amp-grafana-for-haproxy/main.tf | 4 ++-- examples/observability/adot-amp-grafana-for-java/main.tf | 4 ++-- .../observability/adot-amp-grafana-for-memcached/main.tf | 4 ++-- examples/observability/adot-amp-grafana-for-nginx/main.tf | 4 ++-- examples/observability/amp-amg-opensearch/main.tf | 4 ++-- examples/tls-with-aws-pca-issuer/main.tf | 4 ++-- 32 files changed, 71 insertions(+), 68 deletions(-) diff --git a/.github/workflows/e2e-parallel-destroy.yml b/.github/workflows/e2e-parallel-destroy.yml index 29d8274278..1bc8a5e1d5 100644 --- a/.github/workflows/e2e-parallel-destroy.yml +++ b/.github/workflows/e2e-parallel-destroy.yml @@ -42,7 +42,7 @@ jobs: - example_path: examples/node-groups/windows-node-groups steps: - name: Checkout - uses: actions/checkout@v2 + uses: actions/checkout@v3 - name: Setup backend # Un-comment remote backend for use in workflow @@ -57,7 +57,7 @@ jobs: role-session-name: GithubActions-Session - name: Setup Terraform - uses: hashicorp/setup-terraform@v1 + uses: hashicorp/setup-terraform@v2 with: terraform_version: 1.0.0 diff --git a/.github/workflows/e2e-parallel-full.yml b/.github/workflows/e2e-parallel-full.yml index 4ecdc9c574..a724470d98 100644 --- a/.github/workflows/e2e-parallel-full.yml +++ b/.github/workflows/e2e-parallel-full.yml @@ -42,7 +42,7 @@ jobs: - example_path: examples/node-groups/windows-node-groups steps: - name: Checkout - uses: actions/checkout@v2 + uses: actions/checkout@v3 - name: Setup backend # Un-comment remote backend for use in workflow @@ -57,7 +57,7 @@ jobs: role-session-name: GithubActions-Session - name: Setup Terraform - uses: hashicorp/setup-terraform@v1 + uses: hashicorp/setup-terraform@v2 with: terraform_version: 1.0.0 diff --git a/.github/workflows/e2e-terratest.yml b/.github/workflows/e2e-terratest.yml index 59ceedc835..4fcc4808bc 100644 --- a/.github/workflows/e2e-terratest.yml +++ b/.github/workflows/e2e-terratest.yml @@ -20,9 +20,9 @@ jobs: steps: - name: Checkout - uses: actions/checkout@v2 + uses: actions/checkout@v3 - - uses: actions/setup-go@v2 + - uses: actions/setup-go@v3 with: go-version: 1.17 @@ -35,7 +35,7 @@ jobs: role-session-name: GithubActions-Session - name: Terraform - uses: hashicorp/setup-terraform@v1 + uses: hashicorp/setup-terraform@v2 with: terraform_version: 1.0.0 terraform_wrapper: false diff --git a/.github/workflows/markdown-link-check.yml b/.github/workflows/markdown-link-check.yml index 90a6a8a089..da268674c0 100644 --- a/.github/workflows/markdown-link-check.yml +++ b/.github/workflows/markdown-link-check.yml @@ -1,7 +1,9 @@ name: Check Markdown links on: - pull_request: + push: + branches: + - main paths: - "**/*.md" diff --git a/.github/workflows/plan-examples.yml b/.github/workflows/plan-examples.yml index f76e689e99..b751c54b5b 100644 --- a/.github/workflows/plan-examples.yml +++ b/.github/workflows/plan-examples.yml @@ -23,7 +23,7 @@ jobs: steps: # Be careful not to change this to explicit checkout from PR ref/code, as below we run a python code that may change from the PR code. - name: Checkout - uses: actions/checkout@v2 + uses: actions/checkout@v3 - name: Get Terraform directories for evaluation id: dirs @@ -50,13 +50,13 @@ jobs: steps: - name: checkout-merge if: "contains(github.event_name, 'pull_request')" - uses: actions/checkout@v2 + uses: actions/checkout@v3 with: ref: refs/pull/${{github.event.pull_request.number}}/merge - name: checkout if: "!contains(github.event_name, 'pull_request')" - uses: actions/checkout@v2 + uses: actions/checkout@v3 - name: Configure AWS credentials from Test account uses: aws-actions/configure-aws-credentials@v1 @@ -67,7 +67,7 @@ jobs: role-session-name: GithubActions-Session - name: Terraform Job - uses: hashicorp/setup-terraform@v1 + uses: hashicorp/setup-terraform@v2 with: terraform_version: 1.0.0 diff --git a/.github/workflows/pre-commit.yaml b/.github/workflows/pre-commit.yaml index b825d73f02..61804317e1 100644 --- a/.github/workflows/pre-commit.yaml +++ b/.github/workflows/pre-commit.yaml @@ -20,8 +20,9 @@ jobs: outputs: directories: ${{ steps.dirs.outputs.directories }} steps: + - run: aws --version - name: Checkout - uses: actions/checkout@v2 + uses: actions/checkout@v3 - name: Get root directories id: dirs @@ -36,7 +37,7 @@ jobs: directory: ${{ fromJson(needs.collectInputs.outputs.directories) }} steps: - name: Checkout - uses: actions/checkout@v2 + uses: actions/checkout@v3 - name: Config Terraform plugin cache run: mkdir --parents ${{ env.TERRAFORM_DOCS_VERSION }} @@ -76,7 +77,7 @@ jobs: needs: collectInputs steps: - name: Checkout - uses: actions/checkout@v2 + uses: actions/checkout@v3 with: ref: ${{ github.event.pull_request.head.ref }} repository: ${{github.event.pull_request.head.repo.full_name}} diff --git a/examples/analytics/emr-on-eks/main.tf b/examples/analytics/emr-on-eks/main.tf index 1d4ff66479..db60afb261 100644 --- a/examples/analytics/emr-on-eks/main.tf +++ b/examples/analytics/emr-on-eks/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/analytics/spark-k8s-operator/main.tf b/examples/analytics/spark-k8s-operator/main.tf index cdaa8a48c8..f3ed2f511a 100644 --- a/examples/analytics/spark-k8s-operator/main.tf +++ b/examples/analytics/spark-k8s-operator/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/aws-efs-csi-driver/main.tf b/examples/aws-efs-csi-driver/main.tf index e409af2e0e..0457754ca7 100644 --- a/examples/aws-efs-csi-driver/main.tf +++ b/examples/aws-efs-csi-driver/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/ci-cd/gitlab-ci-cd/main.tf b/examples/ci-cd/gitlab-ci-cd/main.tf index 740aeae467..0eedf794bd 100644 --- a/examples/ci-cd/gitlab-ci-cd/main.tf +++ b/examples/ci-cd/gitlab-ci-cd/main.tf @@ -11,7 +11,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -24,7 +24,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/complete-kubernetes-addons/main.tf b/examples/complete-kubernetes-addons/main.tf index 1f99e9a46d..bd5bd7269c 100644 --- a/examples/complete-kubernetes-addons/main.tf +++ b/examples/complete-kubernetes-addons/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/crossplane/main.tf b/examples/crossplane/main.tf index 8068424453..b9155893aa 100644 --- a/examples/crossplane/main.tf +++ b/examples/crossplane/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -35,7 +35,7 @@ provider "kubectl" { load_config_file = false exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/eks-cluster-with-external-dns/main.tf b/examples/eks-cluster-with-external-dns/main.tf index 033db8a2b6..9405590b02 100644 --- a/examples/eks-cluster-with-external-dns/main.tf +++ b/examples/eks-cluster-with-external-dns/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/eks-cluster-with-new-vpc/main.tf b/examples/eks-cluster-with-new-vpc/main.tf index 0d344f4064..4aac23f706 100644 --- a/examples/eks-cluster-with-new-vpc/main.tf +++ b/examples/eks-cluster-with-new-vpc/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/fargate-serverless/main.tf b/examples/fargate-serverless/main.tf index fb154bd5ba..58950a3364 100644 --- a/examples/fargate-serverless/main.tf +++ b/examples/fargate-serverless/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/fully-private-eks-cluster/main.tf b/examples/fully-private-eks-cluster/main.tf index 9845f6bd6f..ad7bf2217a 100644 --- a/examples/fully-private-eks-cluster/main.tf +++ b/examples/fully-private-eks-cluster/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/game-tech/agones-game-controller/main.tf b/examples/game-tech/agones-game-controller/main.tf index 115ca58768..8c0cd477bb 100644 --- a/examples/game-tech/agones-game-controller/main.tf +++ b/examples/game-tech/agones-game-controller/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/gitops/argocd/main.tf b/examples/gitops/argocd/main.tf index b240c027f1..79c65e3674 100644 --- a/examples/gitops/argocd/main.tf +++ b/examples/gitops/argocd/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/ingress-controllers/nginx/main.tf b/examples/ingress-controllers/nginx/main.tf index 2e70f4367f..b3a9b409d5 100644 --- a/examples/ingress-controllers/nginx/main.tf +++ b/examples/ingress-controllers/nginx/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/ipv6-eks-cluster/main.tf b/examples/ipv6-eks-cluster/main.tf index f99f2b9453..9f50f69020 100644 --- a/examples/ipv6-eks-cluster/main.tf +++ b/examples/ipv6-eks-cluster/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/karpenter/main.tf b/examples/karpenter/main.tf index c975127559..86a936c2e9 100644 --- a/examples/karpenter/main.tf +++ b/examples/karpenter/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -35,7 +35,7 @@ provider "kubectl" { load_config_file = false exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/multi-tenancy-with-teams/main.tf b/examples/multi-tenancy-with-teams/main.tf index 5d5e7b2a49..2eb920baaf 100644 --- a/examples/multi-tenancy-with-teams/main.tf +++ b/examples/multi-tenancy-with-teams/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -35,7 +35,7 @@ provider "kubectl" { load_config_file = false exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/node-groups/fargate-profiles/main.tf b/examples/node-groups/fargate-profiles/main.tf index d4bdd70284..bfef3345d4 100644 --- a/examples/node-groups/fargate-profiles/main.tf +++ b/examples/node-groups/fargate-profiles/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/node-groups/managed-node-groups/main.tf b/examples/node-groups/managed-node-groups/main.tf index 5350991587..10d352c001 100644 --- a/examples/node-groups/managed-node-groups/main.tf +++ b/examples/node-groups/managed-node-groups/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/node-groups/self-managed-node-groups/main.tf b/examples/node-groups/self-managed-node-groups/main.tf index 067fc43000..35a0b0f99b 100644 --- a/examples/node-groups/self-managed-node-groups/main.tf +++ b/examples/node-groups/self-managed-node-groups/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/node-groups/windows-node-groups/main.tf b/examples/node-groups/windows-node-groups/main.tf index 9aeb1dbecc..1c886ede04 100644 --- a/examples/node-groups/windows-node-groups/main.tf +++ b/examples/node-groups/windows-node-groups/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/observability/adot-amp-grafana-for-haproxy/main.tf b/examples/observability/adot-amp-grafana-for-haproxy/main.tf index 4f016a24aa..5675442ccc 100644 --- a/examples/observability/adot-amp-grafana-for-haproxy/main.tf +++ b/examples/observability/adot-amp-grafana-for-haproxy/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/observability/adot-amp-grafana-for-java/main.tf b/examples/observability/adot-amp-grafana-for-java/main.tf index 4e812131c6..d13373390d 100644 --- a/examples/observability/adot-amp-grafana-for-java/main.tf +++ b/examples/observability/adot-amp-grafana-for-java/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/observability/adot-amp-grafana-for-memcached/main.tf b/examples/observability/adot-amp-grafana-for-memcached/main.tf index 43008eb1fd..4a0dfeb0fc 100644 --- a/examples/observability/adot-amp-grafana-for-memcached/main.tf +++ b/examples/observability/adot-amp-grafana-for-memcached/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/observability/adot-amp-grafana-for-nginx/main.tf b/examples/observability/adot-amp-grafana-for-nginx/main.tf index 70e49543b0..95625ddae8 100644 --- a/examples/observability/adot-amp-grafana-for-nginx/main.tf +++ b/examples/observability/adot-amp-grafana-for-nginx/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/observability/amp-amg-opensearch/main.tf b/examples/observability/amp-amg-opensearch/main.tf index 54df11fdd9..bea07cdf0d 100644 --- a/examples/observability/amp-amg-opensearch/main.tf +++ b/examples/observability/amp-amg-opensearch/main.tf @@ -7,7 +7,7 @@ provider "kubernetes" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -20,7 +20,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] diff --git a/examples/tls-with-aws-pca-issuer/main.tf b/examples/tls-with-aws-pca-issuer/main.tf index 686462b3c4..56e21f9028 100644 --- a/examples/tls-with-aws-pca-issuer/main.tf +++ b/examples/tls-with-aws-pca-issuer/main.tf @@ -9,7 +9,7 @@ provider "kubectl" { load_config_file = false exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id] @@ -22,7 +22,7 @@ provider "helm" { cluster_ca_certificate = base64decode(module.eks_blueprints.eks_cluster_certificate_authority_data) exec { - api_version = "client.authentication.k8s.io/v1alpha1" + api_version = "client.authentication.k8s.io/v1beta1" command = "aws" # This requires the awscli to be installed locally where Terraform is executed args = ["eks", "get-token", "--cluster-name", module.eks_blueprints.eks_cluster_id]