feat(tf): update terragrunt dependency github.com/terraform-aws-modules/terraform-aws-eks to v20 #239
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v19.21.0
->v20.8.5
Release Notes
terraform-aws-modules/terraform-aws-eks (github.com/terraform-aws-modules/terraform-aws-eks)
v20.8.5
Compare Source
Bug Fixes
v20.8.4
Compare Source
Bug Fixes
v20.8.3
Compare Source
Bug Fixes
v20.8.2
Compare Source
Bug Fixes
ip_family
value is provided to guarantee a CNI policy is attached to nodes (#2967) (29dcca3)v20.8.1
Compare Source
Bug Fixes
v20.8.0
Compare Source
Features
toset()
with static keys for node IAM role policy attachment (#2962) (57f5130)v20.7.0
Compare Source
Features
v20.6.0
Compare Source
Features
v20.5.3
Compare Source
Bug Fixes
AL2023_*
AMI types; ensure AL2023 user data receives cluster service CIDR (#2960) (dfe4114)v20.5.2
Compare Source
Bug Fixes
launch_template_tags
on the launch template (#2957) (0ed32d7)v20.5.1
Compare Source
Bug Fixes
v20.5.0
Compare Source
Features
nodeadm
user data (#2942) (7c99bb1)v20.4.0
Compare Source
Features
v20.3.0
Compare Source
Features
v20.2.2
Compare Source
20.2.2 (2024-02-21)
Bug Fixes
amazonaws.com
(#2941) (081c762)v20.2.1
Compare Source
20.2.1 (2024-02-08)
Bug Fixes
enable_spot_termination = false
should not result in an error (#2907) (671fc6e)v20.2.0
Compare Source
Features
v20.1.1
Compare Source
20.1.1 (2024-02-06)
Bug Fixes
kubernetes_groups
default value tonull
(#2897) (1e32e6a)v20.1.0
Compare Source
Features
access_policy_associations
(#2904) (0d2a4c2)v20.0.1
Compare Source
20.0.1 (2024-02-03)
Bug Fixes
v20.0.0
Compare Source
⚠ BREAKING CHANGES
aws-auth
configmap with EKS cluster access entry (#2858)See the UPGRADE-20.0.md guide for further details on the changes and guidance for upgrading
List of backwards incompatible changes
v5.34
v1.3
to support Terraform statemoved
blocks as well as other advanced featuresresolve_conflicts
argument within thecluster_addons
configuration has been replaced withresolve_conflicts_on_create
andresolve_conflicts_on_delete
now thatresolve_conflicts
is deprecatedpreserve
argument ofcluster_addons
is now set totrue
. This has shown to be useful for users deprovisioning clusters while avoiding the situation where the CNI is deleted too early and causes resources to be left orphaned resulting in conflicts.irsa
naming convention has been removed, along with an update to the Karpenter controller IAM policy to align with Karpenter'sv1beta1
/v0.32
changes. Instead of referring to the role asirsa
orpod_identity
, its simply just an IAM role used by the Karpenter controller and there is support for use with either IRSA and/or Pod Identity (default) at this timeaws-auth
ConfigMap resources have been moved to a standalone sub-module. This removes the Kubernetes provider requirement from the main module and allows for theaws-auth
ConfigMap to be managed independently of the main module. This sub-module will be removed entirely in the next major release.API_AND_CONFIG_MAP
. This is a one way change if applied; if you wish to useCONFIG_MAP
, you will need to setauthentication_mode = "CONFIG_MAP"
explicitly when upgrading.spot_interrupt
updated to correct mis-spelling (wasspot_interupt
). This will cause the rule to be replacedAdditional changes
Added
bootstrap_cluster_creator_admin_permissions
setting on the control plane has been hardcoded tofalse
since this operation is a one time operation only at cluster creation per the EKS API. Instead, users can enable/disableenable_cluster_creator_admin_permissions
at any time to achieve the same functionality. This takes the identity that Terraform is using to make API calls and maps it into a cluster admin via an access entry. For users on existing clusters, you will need to remove the default cluster administrator that was created by EKS prior to the cluster access entry APIs - see the sectionRemoving the default cluster administrator
for more details.instance_maintenance_policy
and have addedmax_healthy_percentage
,scale_in_protected_instances
, andstandby_instances
arguments to theinstance_refresh.preferences
blockModified
sts:AssumeRole
permissions by services, the use of dynamically looking up the DNS suffix has been replaced with the static value ofamazonaws.com
. This does not appear to change by partition and instead requires users to set this manually for non-commercial regions.kms_key_enable_default_policy
has changed fromfalse
totrue
to align with the default behavior of theaws_kms_key
resourcecreate_instance_profile
has changed fromtrue
tofalse
to align with the changes in Karpenter v0.32create_instance_profile
default value has changed fromtrue
tofalse
. Starting with Karpenterv0.32.0
, Karpenter accepts an IAM role and creates the EC2 instance profile used by the nodesRemoved
complete
example has been removed due to its redundancy with the other examplesConfiguration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.