Skip to content
This repository was archived by the owner on Jul 26, 2024. It is now read-only.

Commit cdc8ee2

Browse files
authored
Merge pull request #476 from Azure/patch.cleanup.5.6.10
Update latest rover and minimum terraform version
2 parents 79d036f + 5ecaace commit cdc8ee2

File tree

51 files changed

+326
-243
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+326
-243
lines changed

.devcontainer/docker-compose.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
version: '3.7'
77
services:
88
rover:
9-
image: aztfmod/rover:1.4.6-2305.1807
9+
image: aztfmod/rover:1.4.6-2306.1405
1010
user: vscode
1111

1212
labels:

.github/workflows/landingzones-tf100.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ jobs:
3939
random_length: ['5']
4040

4141
container:
42-
image: aztfmod/rover:1.4.6-2305.1807
42+
image: aztfmod/rover:1.4.6-2306.1405
4343
options: --user 0
4444

4545
steps:
@@ -96,7 +96,7 @@ jobs:
9696
]
9797

9898
container:
99-
image: aztfmod/rover:1.4.6-2305.1807
99+
image: aztfmod/rover:1.4.6-2306.1405
100100
options: --user 0
101101

102102
steps:
@@ -143,7 +143,7 @@ jobs:
143143
random_length: ['5']
144144

145145
container:
146-
image: aztfmod/rover:1.4.6-2305.1807
146+
image: aztfmod/rover:1.4.6-2306.1405
147147
options: --user 0
148148

149149
steps:
@@ -198,7 +198,7 @@ jobs:
198198
]
199199

200200
container:
201-
image: aztfmod/rover:1.4.6-2305.1807
201+
image: aztfmod/rover:1.4.6-2306.1405
202202
options: --user 0
203203

204204
steps:
@@ -244,7 +244,7 @@ jobs:
244244
random_length: ['5']
245245

246246
container:
247-
image: aztfmod/rover:1.4.6-2305.1807
247+
image: aztfmod/rover:1.4.6-2306.1405
248248
options: --user 0
249249

250250
steps:

caf_launchpad/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ terraform {
2323
version = "~> 1.2.0"
2424
}
2525
}
26-
required_version = ">= 1.3.0"
26+
required_version = ">= 1.3.5"
2727
}
2828

2929

caf_solution/add-ons/aad-pod-identity/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,5 +13,5 @@ terraform {
1313
version = "~> 0.5.0"
1414
}
1515
}
16-
required_version = ">= 1.3.0"
16+
required_version = ">= 1.3.5"
1717
}

caf_solution/add-ons/aks-secure-baseline/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,5 +13,5 @@ terraform {
1313
version = ">= 0.5.0"
1414
}
1515
}
16-
required_version = ">= 1.3.0"
16+
required_version = ">= 1.3.5"
1717
}

caf_solution/add-ons/aks_applications/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,5 +17,5 @@ terraform {
1717
version = "~> 0.5.0"
1818
}
1919
}
20-
required_version = ">= 1.3.0"
20+
required_version = ">= 1.3.5"
2121
}

caf_solution/add-ons/aks_applications_v2/cluster_role/cluster_role.tf

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,17 +13,17 @@ resource "kubernetes_cluster_role_v1" "cluster_role" {
1313
metadata {
1414
annotations = try(var.settings.annotations, null)
1515
labels = try(var.settings.labels, null)
16-
name = azurecaf_name.cluster_role.result
16+
name = azurecaf_name.cluster_role.result
1717
}
1818
dynamic "rule" {
1919
for_each = try(var.settings.rule, {})
20-
content {
21-
api_groups = try(rule.value.api_groups, null)
22-
non_resource_urls = try(rule.value.non_resource_urls, null)
23-
resource_names = try(rule.value.resource_names, null)
24-
resources = try(rule.value.resources, null)
25-
verbs = try(rule.value.verbs, null)
26-
}
20+
content {
21+
api_groups = try(rule.value.api_groups, null)
22+
non_resource_urls = try(rule.value.non_resource_urls, null)
23+
resource_names = try(rule.value.resource_names, null)
24+
resources = try(rule.value.resources, null)
25+
verbs = try(rule.value.verbs, null)
26+
}
2727
}
2828

2929
dynamic "aggregation_rule" {
@@ -33,7 +33,7 @@ resource "kubernetes_cluster_role_v1" "cluster_role" {
3333
dynamic "match_expressions" {
3434
for_each = try(aggregation_rule.value.match_expressions, {})
3535
content {
36-
key = try(match_expressions.value.key, null)
36+
key = try(match_expressions.value.key, null)
3737
operator = try(match_expressions.value.operator, null)
3838
values = try(match_expressions.value.values, [])
3939
}
Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "azurecaf_name" "cluster_role_binding" {
2-
name = var.settings.name
2+
name = var.settings.name
33
resource_type = "azurerm_role_assignment"
44
prefixes = var.global_settings.prefixes
55
random_length = var.global_settings.random_length
@@ -12,19 +12,19 @@ resource "kubernetes_cluster_role_binding_v1" "cluster_role_binding" {
1212
metadata {
1313
annotations = try(var.settings.annotations, null)
1414
labels = try(var.settings.labels, null)
15-
name = azurecaf_name.cluster_role_binding.result
15+
name = azurecaf_name.cluster_role_binding.result
1616
}
1717
role_ref {
18-
name = try(var.cluster_role[var.settings.role_key].name, var.settings.role_name)
19-
kind = "ClusterRole"
18+
name = try(var.cluster_role[var.settings.role_key].name, var.settings.role_name)
19+
kind = "ClusterRole"
2020
api_group = "rbac.authorization.k8s.io"
2121
}
2222
dynamic "subject" {
2323
for_each = try(var.settings.subjects, {})
2424
content {
25-
name = coalesce(try(subject.value.name, null), try(var.managed_identities[subject.value.lz_key][subject.value.object_key].rbac_id, null), try(var.azuread_service_principals[subject.value.lz_key][subject.value.object_key].rbac_id, null), try(var.azuread_groups[subject.value.lz_key][subject.value.object_key].rbac_id, null))
26-
kind = can(subject.value.kind) ? subject.value.kind : can(try(var.managed_identities[subject.value.lz_key][subject.value.object_key].rbac_id, null)) ? "User" : can(try(var.azuread_service_principals[subject.value.lz_key][subject.value.object_key].rbac_id, null)) ? "User" : can(try(var.azuread_groups[subject.value.lz_key][subject.value.object_key].rbac_id, null)) ? "Group" : null
27-
api_group = "rbac.authorization.k8s.io"
25+
name = coalesce(try(subject.value.name, null), try(var.managed_identities[subject.value.lz_key][subject.value.object_key].rbac_id, null), try(var.azuread_service_principals[subject.value.lz_key][subject.value.object_key].rbac_id, null), try(var.azuread_groups[subject.value.lz_key][subject.value.object_key].rbac_id, null))
26+
kind = can(subject.value.kind) ? subject.value.kind : can(try(var.managed_identities[subject.value.lz_key][subject.value.object_key].rbac_id, null)) ? "User" : can(try(var.azuread_service_principals[subject.value.lz_key][subject.value.object_key].rbac_id, null)) ? "User" : can(try(var.azuread_groups[subject.value.lz_key][subject.value.object_key].rbac_id, null)) ? "Group" : null
27+
api_group = "rbac.authorization.k8s.io"
2828
}
2929
}
3030
}

caf_solution/add-ons/aks_applications_v2/examples/configuration.tfvars

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ namespaces = {
2121
kv_csi_driver = {
2222
workload_kv_reader = {
2323
aks_clusters = {
24-
lz_key = "aks"
24+
lz_key = "aks"
2525
key = "aks_cluster1"
2626
}
2727
keyvault = {
@@ -74,10 +74,10 @@ role_binding = {
7474
namespace_key = "default"
7575
role_name = "admin"
7676
subjects = {
77-
demouser = {
78-
# user object id
79-
name = "e74a2ee6-433c-46b3-b10f-9abac25b1ba8"
80-
}
77+
demouser = {
78+
# user object id
79+
name = "e74a2ee6-433c-46b3-b10f-9abac25b1ba8"
80+
}
8181
}
8282
}
8383
}

caf_solution/add-ons/aks_applications_v2/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ terraform {
1717
version = "~> 1.2.24"
1818
}
1919
}
20-
required_version = ">= 1.3.0"
20+
required_version = ">= 1.3.5"
2121
}
2222

2323
data "azurerm_client_config" "current" {}

0 commit comments

Comments
 (0)