diff --git a/README.md b/README.md
index 0fdd44c..e17a9fb 100644
--- a/README.md
+++ b/README.md
@@ -43,7 +43,6 @@ sys 0m2.015s
|------|---------|
| [aws](#provider\_aws) | >= 5.14.0 |
| [helm](#provider\_helm) | >= 2.11.0 |
-| [http](#provider\_http) | >= 2.1.0 |
| [kubernetes](#provider\_kubernetes) | >= 2.23.0 |
## Modules
@@ -63,7 +62,6 @@ sys 0m2.015s
| [kubernetes_storage_class.gp3_encrypted](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/storage_class) | resource |
| [aws_ebs_default_kms_key.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ebs_default_kms_key) | data source |
| [aws_kms_key.ebs_key](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/kms_key) | data source |
-| [http_http.cluster_roles](https://registry.terraform.io/providers/hashicorp/http/latest/docs/data-sources/http) | data source |
## Inputs
diff --git a/eks_console_access.tf b/eks_console_access.tf
index 5a54526..d93964b 100644
--- a/eks_console_access.tf
+++ b/eks_console_access.tf
@@ -21,45 +21,12 @@ locals {
{
name = "eks-console-restricted-access"
url = "https://s3.us-west-2.amazonaws.com/amazon-eks/docs/eks-console-restricted-access.yaml"
- enabled = false
+ enabled = true
},
]
cluster_roles_map = { for cr in local.cluster_roles : cr.name => cr if cr.enabled }
}
-# Fetch the YAML files from the specified URLs
-data "http" "cluster_roles" {
- for_each = local.cluster_roles_map
- url = each.value.url
-}
-
-# resource "null_resource" "cluster_roles" {
-# for_each = local.cluster_roles_map
-# triggers = {
-# roles = join(",", [each.key, each.value.url])
-# }
-# provisioner "local-exec" {
-# command = "echo '${data.http.cluster_roles[each.key].body}' > ${each.value.name}.yaml"
-# }
-# }
-
-# # Apply the Kubernetes manifests to the cluster
-# resource "kubernetes_manifest" "deploy_cluster_roles" {
-# manifest = local.manifest_doc
-
-# wait {
-# rollout = true
-# }
-# }
-
-# resource "kubernetes_manifest" "projects" {
-# for_each = { for manifest in provider::kubernetes::manifest_decode_multi(file("${path.module}/bootstrap/projects.yaml")) : "${lower(manifest.kind)}-${manifest.metadata.name}-${manifest.metadata.namespace}" => manifest }
-# manifest = each.value
-# }
-
-# for_each = { for manifest in provider::kubernetes::manifest_decode_multi(data.http.cluster_roles[].body) : "${lower(manifest.kind)}-${manifest.metadata.name}-${manifest.metadata.namespace}" => manifest }
-# manifest = [split("---\n", data.http.cluster_roles[each.key].body)]
-
resource "helm_release" "console_access" {
for_each = local.cluster_roles_map
chart = each.key