Run hack/update-expected.sh

This commit is contained in:
Ciprian Hacman 2022-04-13 07:20:28 +03:00
parent 8b8dd8d2dd
commit 18d45a2994
1124 changed files with 2188 additions and 2188 deletions

View File

@ -663,153 +663,153 @@ resource "aws_route_table_association" "us-test-1a-minimal-example-com" {
subnet_id = aws_subnet.us-test-1a-minimal-example-com.id
}
resource "aws_s3_bucket_object" "cluster-completed-spec" {
resource "aws_s3_object" "cluster-completed-spec" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
key = "clusters.example.com/minimal.example.com/cluster-completed.spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
resource "aws_s3_object" "etcd-cluster-spec-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
key = "clusters.example.com/minimal.example.com/backups/etcd/events/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
resource "aws_s3_object" "etcd-cluster-spec-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
key = "clusters.example.com/minimal.example.com/backups/etcd/main/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "kops-version-txt" {
resource "aws_s3_object" "kops-version-txt" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
key = "clusters.example.com/minimal.example.com/kops-version.txt"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
key = "clusters.example.com/minimal.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-aws-ebs-csi-driver-addons-k8s-io-k8s-1-17" {
resource "aws_s3_object" "minimal-example-com-addons-aws-ebs-csi-driver-addons-k8s-io-k8s-1-17" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-aws-ebs-csi-driver.addons.k8s.io-k8s-1.17_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-aws-ebs-csi-driver.addons.k8s.io-k8s-1.17_content")
key = "clusters.example.com/minimal.example.com/addons/aws-ebs-csi-driver.addons.k8s.io/k8s-1.17.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-bootstrap" {
resource "aws_s3_object" "minimal-example-com-addons-bootstrap" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-bootstrap_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-bootstrap_content")
key = "clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-core-addons-k8s-io" {
resource "aws_s3_object" "minimal-example-com-addons-core-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-core.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-core.addons.k8s.io_content")
key = "clusters.example.com/minimal.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "minimal-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/minimal.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "minimal-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/minimal.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
resource "aws_s3_object" "minimal-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
key = "clusters.example.com/minimal.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
resource "aws_s3_object" "minimal-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
key = "clusters.example.com/minimal.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-limit-range-addons-k8s-io" {
resource "aws_s3_object" "minimal-example-com-addons-limit-range-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-limit-range.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-limit-range.addons.k8s.io_content")
key = "clusters.example.com/minimal.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
resource "aws_s3_object" "minimal-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
key = "clusters.example.com/minimal.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-apiserver" {
resource "aws_s3_object" "nodeupconfig-apiserver" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-apiserver_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-apiserver_content")
key = "clusters.example.com/minimal.example.com/igconfig/apiserver/apiserver/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
resource "aws_s3_object" "nodeupconfig-nodes" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
key = "clusters.example.com/minimal.example.com/igconfig/node/nodes/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
@ -1010,7 +1010,7 @@ terraform {
aws = {
"configuration_aliases" = [aws.files]
"source" = "hashicorp/aws"
"version" = ">= 3.71.0"
"version" = ">= 4.0.0"
}
}
}

View File

@ -560,171 +560,171 @@ resource "aws_route_table_association" "us-test-1a-minimal-example-com" {
subnet_id = aws_subnet.us-test-1a-minimal-example-com.id
}
resource "aws_s3_bucket_object" "cluster-completed-spec" {
resource "aws_s3_object" "cluster-completed-spec" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
key = "clusters.example.com/minimal.example.com/cluster-completed.spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "discovery-json" {
resource "aws_s3_object" "discovery-json" {
acl = "public-read"
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_discovery.json_content")
content = file("${path.module}/data/aws_s3_object_discovery.json_content")
key = "discovery.example.com/minimal.example.com/.well-known/openid-configuration"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
resource "aws_s3_object" "etcd-cluster-spec-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
key = "clusters.example.com/minimal.example.com/backups/etcd/events/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
resource "aws_s3_object" "etcd-cluster-spec-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
key = "clusters.example.com/minimal.example.com/backups/etcd/main/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "keys-json" {
resource "aws_s3_object" "keys-json" {
acl = "public-read"
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_keys.json_content")
content = file("${path.module}/data/aws_s3_object_keys.json_content")
key = "discovery.example.com/minimal.example.com/openid/v1/jwks"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "kops-version-txt" {
resource "aws_s3_object" "kops-version-txt" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
key = "clusters.example.com/minimal.example.com/kops-version.txt"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/events.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/minimal.example.com/manifests/etcd/main.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
key = "clusters.example.com/minimal.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-aws-load-balancer-controller-addons-k8s-io-k8s-1-19" {
resource "aws_s3_object" "minimal-example-com-addons-aws-load-balancer-controller-addons-k8s-io-k8s-1-19" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-aws-load-balancer-controller.addons.k8s.io-k8s-1.19_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-aws-load-balancer-controller.addons.k8s.io-k8s-1.19_content")
key = "clusters.example.com/minimal.example.com/addons/aws-load-balancer-controller.addons.k8s.io/k8s-1.19.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-bootstrap" {
resource "aws_s3_object" "minimal-example-com-addons-bootstrap" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-bootstrap_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-bootstrap_content")
key = "clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-certmanager-io-k8s-1-16" {
resource "aws_s3_object" "minimal-example-com-addons-certmanager-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-certmanager.io-k8s-1.16_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-certmanager.io-k8s-1.16_content")
key = "clusters.example.com/minimal.example.com/addons/certmanager.io/k8s-1.16.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-core-addons-k8s-io" {
resource "aws_s3_object" "minimal-example-com-addons-core-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-core.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-core.addons.k8s.io_content")
key = "clusters.example.com/minimal.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "minimal-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/minimal.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "minimal-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/minimal.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
resource "aws_s3_object" "minimal-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
key = "clusters.example.com/minimal.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
resource "aws_s3_object" "minimal-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
key = "clusters.example.com/minimal.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-limit-range-addons-k8s-io" {
resource "aws_s3_object" "minimal-example-com-addons-limit-range-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-limit-range.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-limit-range.addons.k8s.io_content")
key = "clusters.example.com/minimal.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "minimal-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
resource "aws_s3_object" "minimal-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
key = "clusters.example.com/minimal.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
key = "clusters.example.com/minimal.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
resource "aws_s3_object" "nodeupconfig-nodes" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
key = "clusters.example.com/minimal.example.com/igconfig/node/nodes/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
@ -925,7 +925,7 @@ terraform {
aws = {
"configuration_aliases" = [aws.files]
"source" = "hashicorp/aws"
"version" = ">= 3.71.0"
"version" = ">= 4.0.0"
}
}
}

View File

@ -771,145 +771,145 @@ resource "aws_route_table_association" "utility-us-test-1a-bastionuserdata-examp
subnet_id = aws_subnet.utility-us-test-1a-bastionuserdata-example-com.id
}
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-bootstrap" {
resource "aws_s3_object" "bastionuserdata-example-com-addons-bootstrap" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-bootstrap_content")
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-bootstrap_content")
key = "clusters.example.com/bastionuserdata.example.com/addons/bootstrap-channel.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-core-addons-k8s-io" {
resource "aws_s3_object" "bastionuserdata-example-com-addons-core-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-core.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-core.addons.k8s.io_content")
key = "clusters.example.com/bastionuserdata.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "bastionuserdata-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/bastionuserdata.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "bastionuserdata-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/bastionuserdata.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
resource "aws_s3_object" "bastionuserdata-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
key = "clusters.example.com/bastionuserdata.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
resource "aws_s3_object" "bastionuserdata-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
key = "clusters.example.com/bastionuserdata.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-limit-range-addons-k8s-io" {
resource "aws_s3_object" "bastionuserdata-example-com-addons-limit-range-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-limit-range.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-limit-range.addons.k8s.io_content")
key = "clusters.example.com/bastionuserdata.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
resource "aws_s3_object" "bastionuserdata-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
key = "clusters.example.com/bastionuserdata.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "cluster-completed-spec" {
resource "aws_s3_object" "cluster-completed-spec" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
key = "clusters.example.com/bastionuserdata.example.com/cluster-completed.spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
resource "aws_s3_object" "etcd-cluster-spec-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
key = "clusters.example.com/bastionuserdata.example.com/backups/etcd/events/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
resource "aws_s3_object" "etcd-cluster-spec-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
key = "clusters.example.com/bastionuserdata.example.com/backups/etcd/main/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "kops-version-txt" {
resource "aws_s3_object" "kops-version-txt" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
key = "clusters.example.com/bastionuserdata.example.com/kops-version.txt"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/events.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/main.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
key = "clusters.example.com/bastionuserdata.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-bastion" {
resource "aws_s3_object" "nodeupconfig-bastion" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-bastion_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-bastion_content")
key = "clusters.example.com/bastionuserdata.example.com/igconfig/bastion/bastion/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
key = "clusters.example.com/bastionuserdata.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
resource "aws_s3_object" "nodeupconfig-nodes" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
key = "clusters.example.com/bastionuserdata.example.com/igconfig/node/nodes/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
@ -1245,7 +1245,7 @@ terraform {
aws = {
"configuration_aliases" = [aws.files]
"source" = "hashicorp/aws"
"version" = ">= 3.71.0"
"version" = ">= 4.0.0"
}
}
}

View File

@ -688,137 +688,137 @@ resource "aws_route_table_association" "us-test-1a-complex-example-com" {
subnet_id = aws_subnet.us-test-1a-complex-example-com.id
}
resource "aws_s3_bucket_object" "cluster-completed-spec" {
resource "aws_s3_object" "cluster-completed-spec" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
key = "clusters.example.com/complex.example.com/cluster-completed.spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "complex-example-com-addons-bootstrap" {
resource "aws_s3_object" "complex-example-com-addons-bootstrap" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-bootstrap_content")
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-bootstrap_content")
key = "clusters.example.com/complex.example.com/addons/bootstrap-channel.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "complex-example-com-addons-core-addons-k8s-io" {
resource "aws_s3_object" "complex-example-com-addons-core-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-core.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-core.addons.k8s.io_content")
key = "clusters.example.com/complex.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "complex-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "complex-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/complex.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "complex-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "complex-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/complex.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "complex-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
resource "aws_s3_object" "complex-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
key = "clusters.example.com/complex.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "complex-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
resource "aws_s3_object" "complex-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
key = "clusters.example.com/complex.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "complex-example-com-addons-limit-range-addons-k8s-io" {
resource "aws_s3_object" "complex-example-com-addons-limit-range-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-limit-range.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-limit-range.addons.k8s.io_content")
key = "clusters.example.com/complex.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "complex-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
resource "aws_s3_object" "complex-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
key = "clusters.example.com/complex.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
resource "aws_s3_object" "etcd-cluster-spec-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
key = "clusters.example.com/complex.example.com/backups/etcd/events/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
resource "aws_s3_object" "etcd-cluster-spec-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
key = "clusters.example.com/complex.example.com/backups/etcd/main/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "kops-version-txt" {
resource "aws_s3_object" "kops-version-txt" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
key = "clusters.example.com/complex.example.com/kops-version.txt"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/events.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/complex.example.com/manifests/etcd/main.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
key = "clusters.example.com/complex.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
key = "clusters.example.com/complex.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
resource "aws_s3_object" "nodeupconfig-nodes" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
key = "clusters.example.com/complex.example.com/igconfig/node/nodes/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
@ -1200,7 +1200,7 @@ terraform {
aws = {
"configuration_aliases" = [aws.files]
"source" = "hashicorp/aws"
"version" = ">= 3.71.0"
"version" = ">= 4.0.0"
}
}
}

View File

@ -475,137 +475,137 @@ resource "aws_route_table_association" "us-test-1a-compress-example-com" {
subnet_id = aws_subnet.us-test-1a-compress-example-com.id
}
resource "aws_s3_bucket_object" "cluster-completed-spec" {
resource "aws_s3_object" "cluster-completed-spec" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
key = "clusters.example.com/compress.example.com/cluster-completed.spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "compress-example-com-addons-bootstrap" {
resource "aws_s3_object" "compress-example-com-addons-bootstrap" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-bootstrap_content")
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-bootstrap_content")
key = "clusters.example.com/compress.example.com/addons/bootstrap-channel.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "compress-example-com-addons-core-addons-k8s-io" {
resource "aws_s3_object" "compress-example-com-addons-core-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-core.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-core.addons.k8s.io_content")
key = "clusters.example.com/compress.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "compress-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "compress-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/compress.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "compress-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
resource "aws_s3_object" "compress-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
key = "clusters.example.com/compress.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "compress-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
resource "aws_s3_object" "compress-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
key = "clusters.example.com/compress.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "compress-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
resource "aws_s3_object" "compress-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
key = "clusters.example.com/compress.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "compress-example-com-addons-limit-range-addons-k8s-io" {
resource "aws_s3_object" "compress-example-com-addons-limit-range-addons-k8s-io" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-limit-range.addons.k8s.io_content")
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-limit-range.addons.k8s.io_content")
key = "clusters.example.com/compress.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "compress-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
resource "aws_s3_object" "compress-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
key = "clusters.example.com/compress.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
resource "aws_s3_object" "etcd-cluster-spec-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
key = "clusters.example.com/compress.example.com/backups/etcd/events/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
resource "aws_s3_object" "etcd-cluster-spec-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
key = "clusters.example.com/compress.example.com/backups/etcd/main/control/etcd-cluster-spec"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "kops-version-txt" {
resource "aws_s3_object" "kops-version-txt" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
key = "clusters.example.com/compress.example.com/kops-version.txt"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
resource "aws_s3_object" "manifests-etcdmanager-events" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/events.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
resource "aws_s3_object" "manifests-etcdmanager-main" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
key = "clusters.example.com/compress.example.com/manifests/etcd/main.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
key = "clusters.example.com/compress.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
key = "clusters.example.com/compress.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
}
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
resource "aws_s3_object" "nodeupconfig-nodes" {
bucket = "testingBucket"
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
key = "clusters.example.com/compress.example.com/igconfig/node/nodes/nodeupconfig.yaml"
provider = aws.files
server_side_encryption = "AES256"
@ -806,7 +806,7 @@ terraform {
aws = {
"configuration_aliases" = [aws.files]
"source" = "hashicorp/aws"
"version" = ">= 3.71.0"
"version" = ">= 4.0.0"
}
}
}

Some files were not shown because too many files have changed in this diff Show More