mirror of https://github.com/kubernetes/kops.git
Run hack/update-expected.sh
This commit is contained in:
parent
8b8dd8d2dd
commit
18d45a2994
|
@ -663,153 +663,153 @@ resource "aws_route_table_association" "us-test-1a-minimal-example-com" {
|
|||
subnet_id = aws_subnet.us-test-1a-minimal-example-com.id
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "cluster-completed-spec" {
|
||||
resource "aws_s3_object" "cluster-completed-spec" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
|
||||
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
|
||||
key = "clusters.example.com/minimal.example.com/cluster-completed.spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
|
||||
key = "clusters.example.com/minimal.example.com/backups/etcd/events/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
|
||||
key = "clusters.example.com/minimal.example.com/backups/etcd/main/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "kops-version-txt" {
|
||||
resource "aws_s3_object" "kops-version-txt" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
|
||||
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
|
||||
key = "clusters.example.com/minimal.example.com/kops-version.txt"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
|
||||
key = "clusters.example.com/minimal.example.com/manifests/etcd/events.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
|
||||
key = "clusters.example.com/minimal.example.com/manifests/etcd/main.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
key = "clusters.example.com/minimal.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-aws-ebs-csi-driver-addons-k8s-io-k8s-1-17" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-aws-ebs-csi-driver-addons-k8s-io-k8s-1-17" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-aws-ebs-csi-driver.addons.k8s.io-k8s-1.17_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-aws-ebs-csi-driver.addons.k8s.io-k8s-1.17_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/aws-ebs-csi-driver.addons.k8s.io/k8s-1.17.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-bootstrap" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-bootstrap" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-bootstrap_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-bootstrap_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-core-addons-k8s-io" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-core-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-core.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-core.addons.k8s.io_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-limit-range-addons-k8s-io" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-limit-range-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-apiserver" {
|
||||
resource "aws_s3_object" "nodeupconfig-apiserver" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-apiserver_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-apiserver_content")
|
||||
key = "clusters.example.com/minimal.example.com/igconfig/apiserver/apiserver/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
|
||||
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
|
||||
key = "clusters.example.com/minimal.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
|
||||
resource "aws_s3_object" "nodeupconfig-nodes" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
|
||||
key = "clusters.example.com/minimal.example.com/igconfig/node/nodes/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
|
@ -1010,7 +1010,7 @@ terraform {
|
|||
aws = {
|
||||
"configuration_aliases" = [aws.files]
|
||||
"source" = "hashicorp/aws"
|
||||
"version" = ">= 3.71.0"
|
||||
"version" = ">= 4.0.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -560,171 +560,171 @@ resource "aws_route_table_association" "us-test-1a-minimal-example-com" {
|
|||
subnet_id = aws_subnet.us-test-1a-minimal-example-com.id
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "cluster-completed-spec" {
|
||||
resource "aws_s3_object" "cluster-completed-spec" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
|
||||
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
|
||||
key = "clusters.example.com/minimal.example.com/cluster-completed.spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "discovery-json" {
|
||||
resource "aws_s3_object" "discovery-json" {
|
||||
acl = "public-read"
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_discovery.json_content")
|
||||
content = file("${path.module}/data/aws_s3_object_discovery.json_content")
|
||||
key = "discovery.example.com/minimal.example.com/.well-known/openid-configuration"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
|
||||
key = "clusters.example.com/minimal.example.com/backups/etcd/events/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
|
||||
key = "clusters.example.com/minimal.example.com/backups/etcd/main/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "keys-json" {
|
||||
resource "aws_s3_object" "keys-json" {
|
||||
acl = "public-read"
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_keys.json_content")
|
||||
content = file("${path.module}/data/aws_s3_object_keys.json_content")
|
||||
key = "discovery.example.com/minimal.example.com/openid/v1/jwks"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "kops-version-txt" {
|
||||
resource "aws_s3_object" "kops-version-txt" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
|
||||
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
|
||||
key = "clusters.example.com/minimal.example.com/kops-version.txt"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
|
||||
key = "clusters.example.com/minimal.example.com/manifests/etcd/events.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
|
||||
key = "clusters.example.com/minimal.example.com/manifests/etcd/main.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
key = "clusters.example.com/minimal.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-aws-load-balancer-controller-addons-k8s-io-k8s-1-19" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-aws-load-balancer-controller-addons-k8s-io-k8s-1-19" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-aws-load-balancer-controller.addons.k8s.io-k8s-1.19_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-aws-load-balancer-controller.addons.k8s.io-k8s-1.19_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/aws-load-balancer-controller.addons.k8s.io/k8s-1.19.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-bootstrap" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-bootstrap" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-bootstrap_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-bootstrap_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-certmanager-io-k8s-1-16" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-certmanager-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-certmanager.io-k8s-1.16_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-certmanager.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/certmanager.io/k8s-1.16.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-core-addons-k8s-io" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-core-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-core.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-core.addons.k8s.io_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-limit-range-addons-k8s-io" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-limit-range-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "minimal-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
resource "aws_s3_object" "minimal-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_minimal.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
content = file("${path.module}/data/aws_s3_object_minimal.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
key = "clusters.example.com/minimal.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
|
||||
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
|
||||
key = "clusters.example.com/minimal.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
|
||||
resource "aws_s3_object" "nodeupconfig-nodes" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
|
||||
key = "clusters.example.com/minimal.example.com/igconfig/node/nodes/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
|
@ -925,7 +925,7 @@ terraform {
|
|||
aws = {
|
||||
"configuration_aliases" = [aws.files]
|
||||
"source" = "hashicorp/aws"
|
||||
"version" = ">= 3.71.0"
|
||||
"version" = ">= 4.0.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -771,145 +771,145 @@ resource "aws_route_table_association" "utility-us-test-1a-bastionuserdata-examp
|
|||
subnet_id = aws_subnet.utility-us-test-1a-bastionuserdata-example-com.id
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-bootstrap" {
|
||||
resource "aws_s3_object" "bastionuserdata-example-com-addons-bootstrap" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-bootstrap_content")
|
||||
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-bootstrap_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/addons/bootstrap-channel.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-core-addons-k8s-io" {
|
||||
resource "aws_s3_object" "bastionuserdata-example-com-addons-core-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-core.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-core.addons.k8s.io_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "bastionuserdata-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "bastionuserdata-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
resource "aws_s3_object" "bastionuserdata-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
resource "aws_s3_object" "bastionuserdata-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-limit-range-addons-k8s-io" {
|
||||
resource "aws_s3_object" "bastionuserdata-example-com-addons-limit-range-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "bastionuserdata-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
resource "aws_s3_object" "bastionuserdata-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_bastionuserdata.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
content = file("${path.module}/data/aws_s3_object_bastionuserdata.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "cluster-completed-spec" {
|
||||
resource "aws_s3_object" "cluster-completed-spec" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
|
||||
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/cluster-completed.spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/backups/etcd/events/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/backups/etcd/main/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "kops-version-txt" {
|
||||
resource "aws_s3_object" "kops-version-txt" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
|
||||
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/kops-version.txt"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/events.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/manifests/etcd/main.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-bastion" {
|
||||
resource "aws_s3_object" "nodeupconfig-bastion" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-bastion_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-bastion_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/igconfig/bastion/bastion/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
|
||||
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
|
||||
resource "aws_s3_object" "nodeupconfig-nodes" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
|
||||
key = "clusters.example.com/bastionuserdata.example.com/igconfig/node/nodes/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
|
@ -1245,7 +1245,7 @@ terraform {
|
|||
aws = {
|
||||
"configuration_aliases" = [aws.files]
|
||||
"source" = "hashicorp/aws"
|
||||
"version" = ">= 3.71.0"
|
||||
"version" = ">= 4.0.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -688,137 +688,137 @@ resource "aws_route_table_association" "us-test-1a-complex-example-com" {
|
|||
subnet_id = aws_subnet.us-test-1a-complex-example-com.id
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "cluster-completed-spec" {
|
||||
resource "aws_s3_object" "cluster-completed-spec" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
|
||||
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
|
||||
key = "clusters.example.com/complex.example.com/cluster-completed.spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "complex-example-com-addons-bootstrap" {
|
||||
resource "aws_s3_object" "complex-example-com-addons-bootstrap" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-bootstrap_content")
|
||||
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-bootstrap_content")
|
||||
key = "clusters.example.com/complex.example.com/addons/bootstrap-channel.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "complex-example-com-addons-core-addons-k8s-io" {
|
||||
resource "aws_s3_object" "complex-example-com-addons-core-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-core.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-core.addons.k8s.io_content")
|
||||
key = "clusters.example.com/complex.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "complex-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "complex-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/complex.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "complex-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "complex-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/complex.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "complex-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
resource "aws_s3_object" "complex-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/complex.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "complex-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
resource "aws_s3_object" "complex-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
key = "clusters.example.com/complex.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "complex-example-com-addons-limit-range-addons-k8s-io" {
|
||||
resource "aws_s3_object" "complex-example-com-addons-limit-range-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
key = "clusters.example.com/complex.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "complex-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
resource "aws_s3_object" "complex-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_complex.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
content = file("${path.module}/data/aws_s3_object_complex.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
key = "clusters.example.com/complex.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
|
||||
key = "clusters.example.com/complex.example.com/backups/etcd/events/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
|
||||
key = "clusters.example.com/complex.example.com/backups/etcd/main/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "kops-version-txt" {
|
||||
resource "aws_s3_object" "kops-version-txt" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
|
||||
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
|
||||
key = "clusters.example.com/complex.example.com/kops-version.txt"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
|
||||
key = "clusters.example.com/complex.example.com/manifests/etcd/events.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
|
||||
key = "clusters.example.com/complex.example.com/manifests/etcd/main.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
key = "clusters.example.com/complex.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
|
||||
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
|
||||
key = "clusters.example.com/complex.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
|
||||
resource "aws_s3_object" "nodeupconfig-nodes" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
|
||||
key = "clusters.example.com/complex.example.com/igconfig/node/nodes/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
|
@ -1200,7 +1200,7 @@ terraform {
|
|||
aws = {
|
||||
"configuration_aliases" = [aws.files]
|
||||
"source" = "hashicorp/aws"
|
||||
"version" = ">= 3.71.0"
|
||||
"version" = ">= 4.0.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -475,137 +475,137 @@ resource "aws_route_table_association" "us-test-1a-compress-example-com" {
|
|||
subnet_id = aws_subnet.us-test-1a-compress-example-com.id
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "cluster-completed-spec" {
|
||||
resource "aws_s3_object" "cluster-completed-spec" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_cluster-completed.spec_content")
|
||||
content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content")
|
||||
key = "clusters.example.com/compress.example.com/cluster-completed.spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "compress-example-com-addons-bootstrap" {
|
||||
resource "aws_s3_object" "compress-example-com-addons-bootstrap" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-bootstrap_content")
|
||||
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-bootstrap_content")
|
||||
key = "clusters.example.com/compress.example.com/addons/bootstrap-channel.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "compress-example-com-addons-core-addons-k8s-io" {
|
||||
resource "aws_s3_object" "compress-example-com-addons-core-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-core.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-core.addons.k8s.io_content")
|
||||
key = "clusters.example.com/compress.example.com/addons/core.addons.k8s.io/v1.4.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "compress-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "compress-example-com-addons-coredns-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/compress.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "compress-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
resource "aws_s3_object" "compress-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content")
|
||||
key = "clusters.example.com/compress.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "compress-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
resource "aws_s3_object" "compress-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content")
|
||||
key = "clusters.example.com/compress.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "compress-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
resource "aws_s3_object" "compress-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content")
|
||||
key = "clusters.example.com/compress.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "compress-example-com-addons-limit-range-addons-k8s-io" {
|
||||
resource "aws_s3_object" "compress-example-com-addons-limit-range-addons-k8s-io" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-limit-range.addons.k8s.io_content")
|
||||
key = "clusters.example.com/compress.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "compress-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
resource "aws_s3_object" "compress-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_compress.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
content = file("${path.module}/data/aws_s3_object_compress.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content")
|
||||
key = "clusters.example.com/compress.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-events" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content")
|
||||
key = "clusters.example.com/compress.example.com/backups/etcd/events/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "etcd-cluster-spec-main" {
|
||||
resource "aws_s3_object" "etcd-cluster-spec-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_etcd-cluster-spec-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content")
|
||||
key = "clusters.example.com/compress.example.com/backups/etcd/main/control/etcd-cluster-spec"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "kops-version-txt" {
|
||||
resource "aws_s3_object" "kops-version-txt" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_kops-version.txt_content")
|
||||
content = file("${path.module}/data/aws_s3_object_kops-version.txt_content")
|
||||
key = "clusters.example.com/compress.example.com/kops-version.txt"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-events" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-events" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-events_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events_content")
|
||||
key = "clusters.example.com/compress.example.com/manifests/etcd/events.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-etcdmanager-main" {
|
||||
resource "aws_s3_object" "manifests-etcdmanager-main" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-etcdmanager-main_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main_content")
|
||||
key = "clusters.example.com/compress.example.com/manifests/etcd/main.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content")
|
||||
key = "clusters.example.com/compress.example.com/manifests/static/kube-apiserver-healthcheck.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-master-us-test-1a" {
|
||||
resource "aws_s3_object" "nodeupconfig-master-us-test-1a" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-master-us-test-1a_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content")
|
||||
key = "clusters.example.com/compress.example.com/igconfig/master/master-us-test-1a/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
}
|
||||
|
||||
resource "aws_s3_bucket_object" "nodeupconfig-nodes" {
|
||||
resource "aws_s3_object" "nodeupconfig-nodes" {
|
||||
bucket = "testingBucket"
|
||||
content = file("${path.module}/data/aws_s3_bucket_object_nodeupconfig-nodes_content")
|
||||
content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content")
|
||||
key = "clusters.example.com/compress.example.com/igconfig/node/nodes/nodeupconfig.yaml"
|
||||
provider = aws.files
|
||||
server_side_encryption = "AES256"
|
||||
|
@ -806,7 +806,7 @@ terraform {
|
|||
aws = {
|
||||
"configuration_aliases" = [aws.files]
|
||||
"source" = "hashicorp/aws"
|
||||
"version" = ">= 3.71.0"
|
||||
"version" = ">= 4.0.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue