Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,11 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),

-->

## v0.4.1

### Others
- Upgrade `terraform` and `azurerm` version, so the provider functions normalise_resource_id and parse_resource_id are available to use.

## v0.4.0

### Added
Expand Down
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -106,15 +106,15 @@ Examples are availabe in `examples` directory.

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3 |
| <a name="requirement_azurerm"></a> [azurerm](#requirement\_azurerm) | ~> 3.55 |
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.8 |
| <a name="requirement_azurerm"></a> [azurerm](#requirement\_azurerm) | ~> 4.15 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | ~>2.24 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_azurerm"></a> [azurerm](#provider\_azurerm) | ~> 3.55 |
| <a name="provider_azurerm"></a> [azurerm](#provider\_azurerm) | ~> 4.15 |
| <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | ~>2.24 |

## Modules
Expand Down Expand Up @@ -155,7 +155,7 @@ No modules.
| <a name="input_namespace"></a> [namespace](#input\_namespace) | (optional) The namespace where service account will be created. New will be created if value is not equeal to kube-sytem and default.Required when `create_github_actions_credential` is set to `false`. | `string` | `""` | no |
| <a name="input_namespace_annotations"></a> [namespace\_annotations](#input\_namespace\_annotations) | (optional) Annotations for namespace created via terraform-kubernetes-provider resource. | `map(string)` | `{}` | no |
| <a name="input_namespace_labels"></a> [namespace\_labels](#input\_namespace\_labels) | (optional) Labels for namespace created via terraform-kubernetes-provider resource. | `map(string)` | `{}` | no |
| <a name="input_role_assignments"></a> [role\_assignments](#input\_role\_assignments) | (optional) The role assignments for the service account.<br><br>`role_definition_name`: The name of a role which either needs to be used (azure built-in) or new one you want to create.<br>`name` : A unique UUID/GUID for this Role Assignment - one will be generated if not specified. Changing this forces a new resource to be created.<br>`condition`: The condition that limits the resources that the role can be assigned to. Changing this forces a new resource to be created.<br>`condition_version`: (Optional) The version of the condition. Possible values are 1.0 or 2.0. Changing this forces a new resource to be created.<br>`create_custom_role` : Whether or not to create a custom role. If set to true, then any of the custom\_role\_actions,custom\_role\_data\_actions, custom\_role\_not\_actions, custom\_role\_not\_data\_actions, custom\_role\_assignable\_scopes are required.<br>`scope` : The scope at which the role assignment or custom role will be created.<br>`custom_role_definition_id`: (Optional) A unique UUID/GUID which identifies this role - one will be generated if not specified. Changing this forces a new resource to be created.Only valid for custom role.<br>`custom_role_actions`: One or more Allowed Actions, such as *, Microsoft.Resources/subscriptions/resourceGroups/read. See [Azure Resource Manager resource provider operations](https://learn.microsoft.com/en-gb/azure/role-based-access-control/resource-provider-operations) for details. Only valid for custom role.<br>`custom_role_data_actions` : One or more Allowed Data Actions, such as *, Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read. See [Azure Resource Manager resource provider operations](https://learn.microsoft.com/en-gb/azure/role-based-access-control/resource-provider-operations) for details. Only valid for custom role.<br>`custom_role_not_actions` : One or more Denied Actions, such as Microsoft.Compute/virtualMachines/write.See [Azure Resource Manager resource provider operations](https://learn.microsoft.com/en-gb/azure/role-based-access-control/resource-provider-operations) for details. Only valid for custom role.<br>`custom_role_not_data_actions` : One or more Disallowed Data Actions, such as *, Microsoft.Resources/subscriptions/resourceGroups/read<br>`custom_role_assignable_scopes` : One or more assignable scopes for this Role Definition. The value for scope is automatically included in this list if no other values supplied<br>`custom_role_description` : A description of the role. Only valid for custom role definition. | <pre>set(object({<br> role_definition_name = optional(string)<br> name = optional(string, null)<br> create_custom_role = optional(bool, false)<br> condition = optional(string, null)<br> condition_version = optional(string, null)<br> scope = optional(string)<br> custom_role_description = optional(string)<br> custom_role_definition_id = optional(string, null)<br> custom_role_actions = optional(set(string), [])<br> custom_role_data_actions = optional(set(string), [])<br> custom_role_not_actions = optional(set(string), [])<br> custom_role_not_data_actions = optional(set(string), [])<br> custom_role_assignable_scopes = optional(set(string), null)<br> }))</pre> | `[]` | no |
| <a name="input_role_assignments"></a> [role\_assignments](#input\_role\_assignments) | (optional) The role assignments for the service account.<br/><br/>`role_definition_name`: The name of a role which either needs to be used (azure built-in) or new one you want to create.<br/>`name` : A unique UUID/GUID for this Role Assignment - one will be generated if not specified. Changing this forces a new resource to be created.<br/>`condition`: The condition that limits the resources that the role can be assigned to. Changing this forces a new resource to be created.<br/>`condition_version`: (Optional) The version of the condition. Possible values are 1.0 or 2.0. Changing this forces a new resource to be created.<br/>`create_custom_role` : Whether or not to create a custom role. If set to true, then any of the custom\_role\_actions,custom\_role\_data\_actions, custom\_role\_not\_actions, custom\_role\_not\_data\_actions, custom\_role\_assignable\_scopes are required.<br/>`scope` : The scope at which the role assignment or custom role will be created.<br/>`custom_role_definition_id`: (Optional) A unique UUID/GUID which identifies this role - one will be generated if not specified. Changing this forces a new resource to be created.Only valid for custom role.<br/>`custom_role_actions`: One or more Allowed Actions, such as *, Microsoft.Resources/subscriptions/resourceGroups/read. See [Azure Resource Manager resource provider operations](https://learn.microsoft.com/en-gb/azure/role-based-access-control/resource-provider-operations) for details. Only valid for custom role.<br/>`custom_role_data_actions` : One or more Allowed Data Actions, such as *, Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read. See [Azure Resource Manager resource provider operations](https://learn.microsoft.com/en-gb/azure/role-based-access-control/resource-provider-operations) for details. Only valid for custom role.<br/>`custom_role_not_actions` : One or more Denied Actions, such as Microsoft.Compute/virtualMachines/write.See [Azure Resource Manager resource provider operations](https://learn.microsoft.com/en-gb/azure/role-based-access-control/resource-provider-operations) for details. Only valid for custom role.<br/>`custom_role_not_data_actions` : One or more Disallowed Data Actions, such as *, Microsoft.Resources/subscriptions/resourceGroups/read<br/>`custom_role_assignable_scopes` : One or more assignable scopes for this Role Definition. The value for scope is automatically included in this list if no other values supplied<br/>`custom_role_description` : A description of the role. Only valid for custom role definition. | <pre>set(object({<br/> role_definition_name = optional(string)<br/> name = optional(string, null)<br/> create_custom_role = optional(bool, false)<br/> condition = optional(string, null)<br/> condition_version = optional(string, null)<br/> scope = optional(string)<br/> custom_role_description = optional(string)<br/> custom_role_definition_id = optional(string, null)<br/> custom_role_actions = optional(set(string), [])<br/> custom_role_data_actions = optional(set(string), [])<br/> custom_role_not_actions = optional(set(string), [])<br/> custom_role_not_data_actions = optional(set(string), [])<br/> custom_role_assignable_scopes = optional(set(string), null)<br/> }))</pre> | `[]` | no |
| <a name="input_service_account_name"></a> [service\_account\_name](#input\_service\_account\_name) | (optional) The name of the service account which is using the workload identity. Required when `create_github_actions_credential` is set to `false`. | `string` | `""` | no |
| <a name="input_service_account_token_expiration_seconds"></a> [service\_account\_token\_expiration\_seconds](#input\_service\_account\_token\_expiration\_seconds) | (optional) Represents the expirationSeconds field for the projected service account token | `number` | `86400` | no |
| <a name="input_tags"></a> [tags](#input\_tags) | (Optional) A mapping of tags which should be assigned to the User Assigned Identity. | `map(string)` | `{}` | no |
Expand Down
4 changes: 2 additions & 2 deletions versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@ terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "~> 3.55"
version = "~> 4.15"
}
kubernetes = {
source = "hashicorp/kubernetes"
version = "~>2.24"
}
}
required_version = ">= 1.3"
required_version = ">= 1.8"
}
Loading