diff --git a/helm-dependencies.yaml b/helm-dependencies.yaml
index 9fe80ddd5..8ad2f646f 100644
--- a/helm-dependencies.yaml
+++ b/helm-dependencies.yaml
@@ -9,7 +9,7 @@ dependencies:
version: 0.2.0
repository: https://raw.githubusercontent.com/kubernetes-sigs/secrets-store-csi-driver/master/charts
- name: aws-ebs-csi-driver
- version: 2.6.7
+ version: 2.6.8
repository: https://kubernetes-sigs.github.io/aws-ebs-csi-driver
- name: aws-efs-csi-driver
version: 2.2.6
@@ -21,7 +21,7 @@ dependencies:
version: 1.4.1
repository: https://aws.github.io/eks-charts
- name: aws-node-termination-handler
- version: 0.18.3
+ version: 0.18.4
repository: https://aws.github.io/eks-charts
- name: aws-calico
version: 0.3.11
@@ -33,7 +33,7 @@ dependencies:
version: v0.2.1
repository: https://charts.jetstack.io
- name: cluster-autoscaler
- version: 9.18.0
+ version: 9.18.1
repository: https://kubernetes.github.io/autoscaler
- name: external-dns
version: 1.9.0
@@ -60,10 +60,10 @@ dependencies:
version: 18.1.1
repository: https://codecentric.github.io/helm-charts
- name: kong
- version: 2.8.0
+ version: 2.8.2
repository: https://charts.konghq.com
- name: kube-prometheus-stack
- version: 35.2.0
+ version: 35.3.1
repository: https://prometheus-community.github.io/helm-charts
- name: kyverno
version: v2.3.3
@@ -96,16 +96,16 @@ dependencies:
version: 2.2.1
repository: https://charts.deliveryhero.io/
- name: prometheus-adapter
- version: 3.2.2
+ version: 3.3.0
repository: https://prometheus-community.github.io/helm-charts
- name: prometheus-cloudwatch-exporter
version: 0.18.0
repository: https://prometheus-community.github.io/helm-charts
- name: prometheus-blackbox-exporter
- version: 5.8.0
+ version: 5.8.1
repository: https://prometheus-community.github.io/helm-charts
- name: rabbitmq-cluster-operator
- version: 2.6.1
+ version: 2.6.3
repository: https://charts.bitnami.com/bitnami
- name: scaleway-webhook
version: v0.0.1
@@ -114,26 +114,26 @@ dependencies:
version: 2.1.8
repository: https://bitnami-labs.github.io/sealed-secrets
- name: strimzi-kafka-operator
- version: 0.28.0
+ version: 0.29.0
repository: https://strimzi.io/charts/
- name: thanos
- version: 10.3.8
+ version: 10.4.2
repository: https://charts.bitnami.com/bitnami
- name: tigera-operator
- version: v3.23.0
+ version: v3.23.1
repository: https://docs.projectcalico.org/charts
- name: traefik
version: 10.19.5
repository: https://helm.traefik.io/traefik
- name: memcached
- version: 6.0.17
+ version: 6.0.21
repository: https://charts.bitnami.com/bitnami
- name: vault
- version: 0.19.0
+ version: 0.20.0
repository: https://helm.releases.hashicorp.com
- name: velero
- version: 2.29.5
+ version: 2.29.6
repository: https://vmware-tanzu.github.io/helm-charts
- name: victoria-metrics-k8s-stack
- version: 0.8.3
+ version: 0.9.2
repository: https://victoriametrics.github.io/helm-charts/
diff --git a/modules/aws/README.md b/modules/aws/README.md
index 009571527..653a6f28a 100644
--- a/modules/aws/README.md
+++ b/modules/aws/README.md
@@ -47,22 +47,22 @@ This module can uses [IRSA](https://aws.amazon.com/blogs/opensource/introducing-
| Name | Source | Version |
|------|--------|---------|
-| [iam\_assumable\_role\_aws-ebs-csi-driver](#module\_iam\_assumable\_role\_aws-ebs-csi-driver) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_aws-efs-csi-driver](#module\_iam\_assumable\_role\_aws-efs-csi-driver) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_aws-for-fluent-bit](#module\_iam\_assumable\_role\_aws-for-fluent-bit) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_aws-load-balancer-controller](#module\_iam\_assumable\_role\_aws-load-balancer-controller) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_cert-manager](#module\_iam\_assumable\_role\_cert-manager) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_cluster-autoscaler](#module\_iam\_assumable\_role\_cluster-autoscaler) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_cni-metrics-helper](#module\_iam\_assumable\_role\_cni-metrics-helper) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_external-dns](#module\_iam\_assumable\_role\_external-dns) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_kube-prometheus-stack\_grafana](#module\_iam\_assumable\_role\_kube-prometheus-stack\_grafana) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_kube-prometheus-stack\_thanos](#module\_iam\_assumable\_role\_kube-prometheus-stack\_thanos) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_loki-stack](#module\_iam\_assumable\_role\_loki-stack) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_prometheus-cloudwatch-exporter](#module\_iam\_assumable\_role\_prometheus-cloudwatch-exporter) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_thanos](#module\_iam\_assumable\_role\_thanos) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_thanos-storegateway](#module\_iam\_assumable\_role\_thanos-storegateway) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_vault](#module\_iam\_assumable\_role\_vault) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
-| [iam\_assumable\_role\_velero](#module\_iam\_assumable\_role\_velero) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 4.0 |
+| [iam\_assumable\_role\_aws-ebs-csi-driver](#module\_iam\_assumable\_role\_aws-ebs-csi-driver) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_aws-efs-csi-driver](#module\_iam\_assumable\_role\_aws-efs-csi-driver) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_aws-for-fluent-bit](#module\_iam\_assumable\_role\_aws-for-fluent-bit) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_aws-load-balancer-controller](#module\_iam\_assumable\_role\_aws-load-balancer-controller) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_cert-manager](#module\_iam\_assumable\_role\_cert-manager) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_cluster-autoscaler](#module\_iam\_assumable\_role\_cluster-autoscaler) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_cni-metrics-helper](#module\_iam\_assumable\_role\_cni-metrics-helper) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_external-dns](#module\_iam\_assumable\_role\_external-dns) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_kube-prometheus-stack\_grafana](#module\_iam\_assumable\_role\_kube-prometheus-stack\_grafana) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_kube-prometheus-stack\_thanos](#module\_iam\_assumable\_role\_kube-prometheus-stack\_thanos) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_loki-stack](#module\_iam\_assumable\_role\_loki-stack) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_prometheus-cloudwatch-exporter](#module\_iam\_assumable\_role\_prometheus-cloudwatch-exporter) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_thanos](#module\_iam\_assumable\_role\_thanos) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_thanos-storegateway](#module\_iam\_assumable\_role\_thanos-storegateway) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_vault](#module\_iam\_assumable\_role\_vault) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
+| [iam\_assumable\_role\_velero](#module\_iam\_assumable\_role\_velero) | terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc | ~> 5.0 |
| [kube-prometheus-stack\_thanos\_bucket](#module\_kube-prometheus-stack\_thanos\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
| [loki\_bucket](#module\_loki\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
| [security-group-efs-csi-driver](#module\_security-group-efs-csi-driver) | terraform-aws-modules/security-group/aws//modules/nfs | ~> 4.0 |
diff --git a/modules/aws/aws-ebs-csi-driver.tf b/modules/aws/aws-ebs-csi-driver.tf
index c672e807e..fb25957f9 100644
--- a/modules/aws/aws-ebs-csi-driver.tf
+++ b/modules/aws/aws-ebs-csi-driver.tf
@@ -58,7 +58,7 @@ VALUES
module "iam_assumable_role_aws-ebs-csi-driver" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.aws-ebs-csi-driver["enabled"] && local.aws-ebs-csi-driver["create_iam_resources_irsa"]
role_name = local.aws-ebs-csi-driver["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/aws-efs-csi-driver.tf b/modules/aws/aws-efs-csi-driver.tf
index 6b8066e48..dd84b0df9 100644
--- a/modules/aws/aws-efs-csi-driver.tf
+++ b/modules/aws/aws-efs-csi-driver.tf
@@ -41,7 +41,7 @@ locals {
module "iam_assumable_role_aws-efs-csi-driver" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.aws-efs-csi-driver["enabled"] && local.aws-efs-csi-driver["create_iam_resources_irsa"]
role_name = local.aws-efs-csi-driver["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/aws-for-fluent-bit.tf b/modules/aws/aws-for-fluent-bit.tf
index fbacaa088..f5f432b62 100644
--- a/modules/aws/aws-for-fluent-bit.tf
+++ b/modules/aws/aws-for-fluent-bit.tf
@@ -43,7 +43,7 @@ VALUES
module "iam_assumable_role_aws-for-fluent-bit" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.aws-for-fluent-bit["enabled"] && local.aws-for-fluent-bit["create_iam_resources_irsa"]
role_name = local.aws-for-fluent-bit["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/aws-load-balancer-controller.tf b/modules/aws/aws-load-balancer-controller.tf
index 0ce8bef26..e1fa18f8b 100644
--- a/modules/aws/aws-load-balancer-controller.tf
+++ b/modules/aws/aws-load-balancer-controller.tf
@@ -30,7 +30,7 @@ VALUES
module "iam_assumable_role_aws-load-balancer-controller" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.aws-load-balancer-controller["enabled"] && local.aws-load-balancer-controller["create_iam_resources_irsa"]
role_name = local.aws-load-balancer-controller["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/cert-manager.tf b/modules/aws/cert-manager.tf
index 7342c3699..a2cfc99b2 100644
--- a/modules/aws/cert-manager.tf
+++ b/modules/aws/cert-manager.tf
@@ -46,7 +46,7 @@ VALUES
module "iam_assumable_role_cert-manager" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.cert-manager["enabled"] && local.cert-manager["create_iam_resources_irsa"]
role_name = local.cert-manager["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/cluster-autoscaler.tf b/modules/aws/cluster-autoscaler.tf
index 5c38b32d1..90960d915 100644
--- a/modules/aws/cluster-autoscaler.tf
+++ b/modules/aws/cluster-autoscaler.tf
@@ -51,7 +51,7 @@ VALUES
module "iam_assumable_role_cluster-autoscaler" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.cluster-autoscaler["enabled"] && local.cluster-autoscaler["create_iam_resources_irsa"]
role_name = local.cluster-autoscaler["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/cni-metrics-helper.tf b/modules/aws/cni-metrics-helper.tf
index a22575394..fda11f33b 100644
--- a/modules/aws/cni-metrics-helper.tf
+++ b/modules/aws/cni-metrics-helper.tf
@@ -13,7 +13,7 @@ locals {
module "iam_assumable_role_cni-metrics-helper" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.cni-metrics-helper["enabled"] && local.cni-metrics-helper["create_iam_resources_irsa"]
role_name = local.cni-metrics-helper["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/external-dns.tf b/modules/aws/external-dns.tf
index 61bdf4e2b..3f7725aa6 100644
--- a/modules/aws/external-dns.tf
+++ b/modules/aws/external-dns.tf
@@ -42,7 +42,7 @@ locals {
module "iam_assumable_role_external-dns" {
for_each = local.external-dns
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = each.value["enabled"] && each.value["create_iam_resources_irsa"]
role_name = "${each.value.name_prefix}-${each.key}"
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/kube-prometheus.tf b/modules/aws/kube-prometheus.tf
index 10bcb4045..6ea0856c7 100644
--- a/modules/aws/kube-prometheus.tf
+++ b/modules/aws/kube-prometheus.tf
@@ -268,7 +268,7 @@ VALUES
module "iam_assumable_role_kube-prometheus-stack_grafana" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.kube-prometheus-stack["enabled"] && local.kube-prometheus-stack["grafana_create_iam_resources_irsa"]
role_name = "${local.kube-prometheus-stack["name_prefix"]}-grafana"
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
@@ -280,7 +280,7 @@ module "iam_assumable_role_kube-prometheus-stack_grafana" {
module "iam_assumable_role_kube-prometheus-stack_thanos" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.kube-prometheus-stack["enabled"] && local.kube-prometheus-stack["thanos_create_iam_resources_irsa"] && local.kube-prometheus-stack["thanos_sidecar_enabled"]
role_name = "${local.kube-prometheus-stack["name_prefix"]}-thanos"
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/loki-stack.tf b/modules/aws/loki-stack.tf
index 5f21da530..9a99155e8 100644
--- a/modules/aws/loki-stack.tf
+++ b/modules/aws/loki-stack.tf
@@ -57,7 +57,7 @@ locals {
module "iam_assumable_role_loki-stack" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.loki-stack["enabled"] && local.loki-stack["create_iam_resources_irsa"]
role_name = local.loki-stack["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/prometheus-cloudwatch-exporter.tf b/modules/aws/prometheus-cloudwatch-exporter.tf
index 059721d19..6fce04361 100644
--- a/modules/aws/prometheus-cloudwatch-exporter.tf
+++ b/modules/aws/prometheus-cloudwatch-exporter.tf
@@ -32,7 +32,7 @@ locals {
module "iam_assumable_role_prometheus-cloudwatch-exporter" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.prometheus-cloudwatch-exporter["enabled"] && local.prometheus-cloudwatch-exporter["create_iam_resources_irsa"]
role_name = local.prometheus-cloudwatch-exporter["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/thanos-storegateway.tf b/modules/aws/thanos-storegateway.tf
index 13f6473d5..0febf454c 100644
--- a/modules/aws/thanos-storegateway.tf
+++ b/modules/aws/thanos-storegateway.tf
@@ -60,7 +60,7 @@ locals {
module "iam_assumable_role_thanos-storegateway" {
for_each = local.thanos-storegateway
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = each.value["enabled"] && each.value["create_iam_resources_irsa"]
role_name = "${each.value.name_prefix}-${each.key}"
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/thanos.tf b/modules/aws/thanos.tf
index 9bc00c2ea..041f489fc 100644
--- a/modules/aws/thanos.tf
+++ b/modules/aws/thanos.tf
@@ -221,7 +221,7 @@ locals {
module "iam_assumable_role_thanos" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.thanos["enabled"] && local.thanos["create_iam_resources_irsa"]
role_name = local.thanos["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/vault.tf b/modules/aws/vault.tf
index 08a899ebb..1527b6475 100644
--- a/modules/aws/vault.tf
+++ b/modules/aws/vault.tf
@@ -86,7 +86,7 @@ locals {
module "iam_assumable_role_vault" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.vault["enabled"] && local.vault["create_iam_resources_irsa"] && local.vault["use_kms"]
role_name = local.vault["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")
diff --git a/modules/aws/velero.tf b/modules/aws/velero.tf
index 95ee7b0a0..47f8f55d7 100644
--- a/modules/aws/velero.tf
+++ b/modules/aws/velero.tf
@@ -64,7 +64,7 @@ VALUES
module "iam_assumable_role_velero" {
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
- version = "~> 4.0"
+ version = "~> 5.0"
create_role = local.velero["enabled"] && local.velero["create_iam_resources_irsa"]
role_name = local.velero["name_prefix"]
provider_url = replace(var.eks["cluster_oidc_issuer_url"], "https://", "")