diff --git a/CHANGELOG.md b/CHANGELOG.md index e0876e4..6705183 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,6 +6,9 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0 ## Unreleased +## 16.0.1 +* resolving syntax errors + ## 16.0.0 * upgrade to EKS module 20.8.5 * introducing eks access entries and making updates diff --git a/eks-access-entries.tf b/eks-access-entries.tf index 2187419..353f7a8 100644 --- a/eks-access-entries.tf +++ b/eks-access-entries.tf @@ -13,9 +13,7 @@ resource "aws_eks_access_entry" "cluster_admin" { type = "STANDARD" user_name = try(each.value.user_name, null) - depends_on = [ - module.eks_managed_node_groups, - ] + depends_on = [module.eks_managed_node_groups] } resource "aws_eks_access_policy_association" "cluster_admin" { @@ -31,9 +29,7 @@ resource "aws_eks_access_policy_association" "cluster_admin" { policy_arn = "arn:${data.aws_partition.current.partition}:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" principal_arn = each.value - depends_on = [ - aws_eks_access_entry.cluster_admin, - ] + depends_on = [aws_eks_access_entry.cluster_admin] } ## The resources access entry and policy association is targeting roles that require cluster Admin ReadOnly Permissions @@ -46,9 +42,7 @@ resource "aws_eks_access_entry" "cluster_admin_readonly" { type = "STANDARD" user_name = try(each.value.user_name, null) - depends_on = [ - module.eks_managed_node_groups, - ] + depends_on = [module.eks_managed_node_groups] } resource "aws_eks_access_policy_association" "cluster_admin_readonly" { @@ -64,9 +58,7 @@ resource "aws_eks_access_policy_association" "cluster_admin_readonly" { policy_arn = "arn:${data.aws_partition.current.partition}:eks::aws:cluster-access-policy/AmazonEKSAdminViewPolicy" principal_arn = each.value - depends_on = [ - aws_eks_access_entry.cluster_admin_readonly, - ] + depends_on = [aws_eks_access_entry.cluster_admin_readonly] } ## Creating access entry for delete_ebs_volumes_lambda with namespaced adminpolicy @@ -95,7 +87,5 @@ resource "aws_eks_access_policy_association" "delete_ebs_volume" { policy_arn = "arn:${data.aws_partition.current.partition}:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy" principal_arn = var.delete_ebs_volume_role_arn - depends_on = [ - aws_eks_access_entry.delete_ebs_volume, - ] + depends_on = [aws_eks_access_entry.delete_ebs_volume] }