Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update other dependencies (major) #142

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jun 14, 2024

Mend Renovate

This PR contains the following updates:

Package Type Update Change
actions/checkout action major v3 -> v4
actions/setup-node action major v3 -> v4
actions/setup-python action major v3 -> v5
actions/setup-python action major v4 -> v5
azure/setup-helm action major v3 -> v4
terraform-aws-modules/eks/aws (source) module major 19.16.0 -> 20.14.0
terraform-aws-modules/iam/aws (source) module major 4.1.0 -> 5.39.1
terraform-google-modules/kubernetes-engine/google (source) module major 27.0.0 -> 31.0.0
terraform-linters/setup-tflint action major v3 -> v4

Release Notes

actions/checkout (actions/checkout)

v4

Compare Source

actions/setup-node (actions/setup-node)

v4

Compare Source

actions/setup-python (actions/setup-python)

v5

Compare Source

v4

Compare Source

azure/setup-helm (azure/setup-helm)

v4

Compare Source

terraform-aws-modules/terraform-aws-eks (terraform-aws-modules/eks/aws)

v20.14.0

Compare Source

Features
  • Require users to supply OS via ami_type and not via platform which is unable to distinquish between the number of variants supported today (#​3068) (ef657bf)

v20.13.1

Compare Source

Bug Fixes
  • Correct syntax for correctly ignoring bootstrap_cluster_creator_admin_permissions and not all of access_config (#​3056) (1e31929)

v20.13.0

Compare Source

Features
  • Starting with 1.30, do not use the cluster OIDC issuer URL by default in the identity provider config (#​3055) (00f076a)

v20.12.0

Compare Source

Features
  • Support additional cluster DNS IPs with Bottlerocket based AMIs (#​3051) (541dbb2)

v20.11.1

Compare Source

Bug Fixes
  • Ignore changes to bootstrap_cluster_creator_admin_permissions which is disabled by default (#​3042) (c65d308)

v20.11.0

Compare Source

Features
  • Add SourceArn condition to Fargate profile trust policy (#​3039) (a070d7b)

v20.10.0

Compare Source

Features
  • Add support for Pod Identity assocation on Karpenter sub-module (#​3031) (cfcaf27)

v20.9.0

Compare Source

Features
  • Propagate ami_type to self-managed node group; allow using ami_type only (#​3030) (74d3918)

v20.8.5

Compare Source

Bug Fixes
  • Forces cluster outputs to wait until access entries are complete (#​3000) (e2a39c0)

v20.8.4

Compare Source

Bug Fixes
  • Pass nodeadm user data variables from root module down to nodegroup sub-modules (#​2981) (84effa0)

v20.8.3

Compare Source

Bug Fixes
  • Ensure the correct service CIDR and IP family is used in the rendered user data (#​2963) (aeb9f0c)

v20.8.2

Compare Source

Bug Fixes
  • Ensure a default ip_family value is provided to guarantee a CNI policy is attached to nodes (#​2967) (29dcca3)

v20.8.1

Compare Source

Bug Fixes
  • Do not attach policy if Karpenter node role is not created by module (#​2964) (3ad19d7)

v20.8.0

Compare Source

Features
  • Replace the use of toset() with static keys for node IAM role policy attachment (#​2962) (57f5130)

v20.7.0

Compare Source

Features
  • Add supprot for creating placement group for managed node group (#​2959) (3031631)

v20.6.0

Compare Source

Features
  • Add support for tracking latest AMI release version on managed nodegroups (#​2951) (393da7e)

v20.5.3

Compare Source

Bug Fixes
  • Update AWS provider version to support AL2023_* AMI types; ensure AL2023 user data receives cluster service CIDR (#​2960) (dfe4114)

v20.5.2

Compare Source

Bug Fixes

v20.5.1

Compare Source

Bug Fixes
  • Update CI workflow versions to remove deprecated runtime warnings (#​2956) (d14cc92)

v20.5.0

Compare Source

Features

v20.4.0

Compare Source

Features

v20.3.0

Compare Source

Features
  • Add support for addon and identity provider custom tags (#​2938) (f6255c4)
20.2.2 (2024-02-21)
Bug Fixes
  • Replace Karpenter SQS policy dynamic service princpal DNS suffixes with static amazonaws.com (#​2941) (081c762)
20.2.1 (2024-02-08)
Bug Fixes
  • Karpenter enable_spot_termination = false should not result in an error (#​2907) (671fc6e)

v20.2.2

Compare Source

v20.2.1

Compare Source

v20.2.0

Compare Source

Features
  • Allow enable/disable of EKS pod identity for the Karpenter controller (#​2902) (cc6919d)
20.1.1 (2024-02-06)
Bug Fixes
  • Update access entries kubernetes_groups default value to null (#​2897) (1e32e6a)

v20.1.1

Compare Source

v20.1.0

Compare Source

Features
20.0.1 (2024-02-03)
Bug Fixes
  • Correct cluster access entry to create multiple policy associations per access entry (#​2892) (4177913)

v20.0.1

Compare Source

v20.0.0

Compare Source

⚠ BREAKING CHANGES
  • Replace the use of aws-auth configmap with EKS cluster access entry (#​2858)
Features
  • Replace the use of aws-auth configmap with EKS cluster access entry (#​2858) (6b40bdb)

v19.21.0

Compare Source

Features

v19.20.0

Compare Source

Features
  • Allow OIDC root CA thumbprint to be included/excluded (#​2778) (091c680)
19.19.1 (2023-11-10)
Bug Fixes
  • Remove additional conditional on Karpenter instance profile creation to support upgrading (#​2812) (c36c8dc)

v19.19.1

Compare Source

v19.19.0

Compare Source

Features
  • Update KMS module to avoid calling data sources when create_kms_key = false (#​2804) (0732bea)

v19.18.0

Compare Source

Features
19.17.4 (2023-10-30)
Bug Fixes
19.17.3 (2023-10-30)
Bug Fixes
19.17.2 (2023-10-10)
Bug Fixes
  • Karpenter node IAM role policies variable should be a map of strings, not list (#​2771) (f4766e5)
19.17.1 (2023-10-06)
Bug Fixes

v19.17.4

Compare Source

v19.17.3

Compare Source

v19.17.2

Compare Source

v19.17.1

Compare Source

v19.17.0

Compare Source

Features
  • Add support for allowed_instance_types on self-managed nodegroup ASG (#​2757) (feee18d)
terraform-aws-modules/terraform-aws-iam (terraform-aws-modules/iam/aws)

v5.39.1

Compare Source

Bug Fixes
  • Fixed trust condition in modules/iam-github-oidc-role to be https (#​490) (ecaed18)

v5.39.0

Compare Source

Features

v5.38.0

Compare Source

Features
  • EBS fast snapshot restores persmission for EKS IRSA (#​469) (9ea77ca)

v5.37.2

Compare Source

Bug Fixes
  • Allow user to change own password when no MFA is present (#​470) (ef0056b)

v5.37.1

Compare Source

Bug Fixes
  • Update CI workflow versions to remove deprecated runtime warnings (#​465) (82348df)

v5.37.0

Compare Source

Features
  • Extend self-management policy to read account summary (iam-group-with-policies) (#​462) (0bedaf4)

v5.36.0

Compare Source

Features
  • Add support for Mountpoint S3 CSI driver to EKS IRSA (#​459) (21fb8d9)

v5.35.0

Compare Source

Features
  • Allow users to set and read own access keys description (iam-group-with-policies) (#​461) (c80cd10)

v5.34.0

Compare Source

Features
5.33.1 (2024-01-18)
Bug Fixes
  • Skip retrieving EKS cluster data when not creating the role (#​436) (bcdf554)

v5.33.1

Compare Source

v5.33.0

Compare Source

Features
  • Add support for Amazon CloudWatch Observability IRSA role (#​446) (25e2bf9)
5.32.1 (2023-12-11)
Bug Fixes
  • Remove unused TLS provider in iam-github-oidc-role (#​439) (2ce3885)

v5.32.1

Compare Source

v5.32.0

Compare Source

Features

v5.31.0

Compare Source

Features
  • Allow users to change own password in iam-group-with-policies module (#​435) (eb5b218)
5.30.2 (2023-11-10)
Bug Fixes
5.30.1 (2023-11-04)
Bug Fixes
  • Direct policy attachment of iam-policy-created resources (#​428) (543f101)

v5.30.2

Compare Source

v5.30.1

Compare Source

v5.30.0

Compare Source

Features
  • Add create_custom_role_trust_policy to control when a custom_role_trust_policy should be used (#​321) (481095e)
5.29.2 (2023-08-30)
Bug Fixes
  • Expand Permissions for external-secrets IRSA Policy towards AWS Secrets Manager (#​416) (fa74a18)
5.29.1 (2023-08-30)
Bug Fixes
  • Add missing condition role_session_name when assuming a role (#​418) (89d011e)

v5.29.2

Compare Source

v5.29.1

Compare Source

v5.29.0

Compare Source

Features
  • Add variable for adding statement for secretsmanager:CreateSecret (#​414) (24996cd)

v5.28.0

Compare Source

Features
  • Added direct policy attachment in iam-user module (#​387) (9fa481f)

v5.27.0

Compare Source

Features

v5.26.0

Compare Source

Features

v5.25.0

Compare Source

Features
  • Added variable load_balancer_controller_targetgroup_arns in iam-role-for-service-accounts-eks module (#​402) (61a5dbe)

v5.24.0

Compare Source

Features
5.23.1 (2023-06-29)
Bug Fixes

v5.23.1

Compare Source

v5.23.0

Compare Source

Features
  • Added variable trusted_role_actions to sub modules as a "Action of STS" (#​393) (5702679)

v5.22.0

Compare Source

Features

v5.21.0

Compare Source

Features
  • Added permissions to list zone tags in iam-role-for-service-accounts-eks module (#​394) (740945f)

v5.20.0

Compare Source

Features
  • Add support for AWS Gateway controller (VPC Lattice) to IRSA module (#​378) (fdee003)

v5.19.0

Compare Source

Features
  • Add support for condition role_session_name when assuming a role (#​379) (5aabe67)

v5.18.0

Compare Source

Features
  • iam-eks-role: Add variable to allow change of IAM assume role condition test operator (#​367) (542fc5a)
5.17.1 (2023-05-05)
Bug Fixes
  • Remove "autoscaling:UpdateAutoScalingGroup" permission from cluster-autoscaler IRSA (#​357) (aeb5d7f)

v5.17.1

Compare Source

v5.17.0

Compare Source

Features
  • Add name_prefix to iam-policy and iam-read-only-policy modules (#​369) (5bf5f6f)

v5.16.0

Compare Source

Features
  • Add elasticloadbalancing:AddTags permissions to AWS Load Balancer Controller policy required for version 2.4.7+ (#​358) (e1403c1)

v5.15.0

Compare Source

Features
  • Add permissions for instance requirements support for cluster autoscaler IRSA policy (#​356) (fac0cdc)
5.14.4 (2023-03-24)
Bug Fixes
5.14.3 (2023-03-23)
Bug Fixes
  • Do not attach force MFA statement for iam-groups-with-policies by default (#​333) (b9f3409)
5.14.2 (2023-03-21)
Bug Fixes
  • Add ssm:DescribeParameters permission to external-secrets IAM role for service account (IRSA) (#​348) (fe8d73b)
5.14.1 (2023-03-21)
Bug Fixes
  • Update self manage policy to support users with path (#​335) (9a8d5cb)

v5.14.4

Compare Source

v5.14.3

Compare Source

v5.14.2

Compare Source

v5.14.1

Compare Source

v5.14.0

Compare Source

Features
  • Update efs_csi policy to support resource tagging (#​352) (47cb7a2)

v5.13.0

Compare Source

Features
  • Add support for path in iam-group-with-assumable-roles-policy (#​345) (761368e)

v5.12.0

Compare Source

Features
  • Add eks:DescribeCluster for Karpenter cluster endpoint auto discovery (#​343) (3f2cdc8)
5.11.2 (2023-02-15)
Bug Fixes
5.11.1 (2023-01-19)
Bug Fixes

v5.11.2

Compare Source

v5.11.1

Compare Source

v5.11.0

Compare Source

Features
  • Allow multiple MFA devices and users to manage MFA devices (#​313) (57a5d70)

v5.10.0

Compare Source

Features
  • Added Extra STS actions param in assumable role with SAML (#​317) (a2ad4cd)
Bug Fixes
  • Use a version for to avoid GitHub API rate limiting on CI workflows (#​323) (90349fa)
5.9.2 (2022-12-10)
Bug Fixes
5.9.1 (2022-12-07)
Bug Fixes
  • Add ssm:GetParameters permission to external-secrets policy (#​316) (0e77849)

v5.9.2

Compare Source

v5.9.1

Compare Source

v5.9.0

Compare Source

Features

v5.8.0

Compare Source

Features
  • Add additional permissions to Karpenter EKS IRSA role for native node termination handling support (#​304) (d6865d2)

v5.7.0

Compare Source

Features
  • Ensure that GitHub OIDC subject prefixes are normalied for repo: (#​310) (b9873a0)

v5.6.0

Compare Source

Features
  • Add support for creating IAM GitHub OIDC provider and role(s) (#​308) (cc44693)
5.5.7 (2022-11-09)
Bug Fixes
  • Add secretsmanager:ListSecrets to external-secrets policy (#​305) (d3fb017)
5.5.6 (2022-11-07)
Bug Fixes
  • Update CI configuration files to use latest version (#​302) (4c1c958)
5.5.5 (2022-11-01)
Bug Fixes
5.5.4 (2022-10-26)
Bug Fixes
  • Insufficient permissions for karpenter policy when not using karpenter discovery tags on security group (#​294) (5ad496b)
5.5.3 (2022-10-26)
Bug Fixes
  • Correct tflint errors for latest version of tflint (#​296) (b40ade4)
5.5.2 (2022-10-13)
Bug Fixes
  • Explicitly assume with condition matching role arn (#​283) (470b6ff)
5.5.1 (2022-10-12)
Bug Fixes

v5.5.7

Compare Source

v5.5.6

Compare Source

v5.5.5

Compare Source

v5.5.4

Compare Source

v5.5.3

[Compare Source](https://togithub.com/terraform-


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

Copy link
Contributor Author

renovate bot commented Jun 14, 2024

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants