Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update terraform terraform-aws-modules/eks/aws to v20 #136

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 2, 2024

This PR contains the following updates:

Package Type Update Change
terraform-aws-modules/eks/aws (source) module major 19.21.0 -> 20.33.1

Release Notes

terraform-aws-modules/terraform-aws-eks (terraform-aws-modules/eks/aws)

v20.33.1

Compare Source

Bug Fixes
  • Allow "EC2" access entry type for EKS Auto Mode custom node pools (#​3281) (3e2ea83)

v20.33.0

Compare Source

Features

v20.32.0

Compare Source

Features

v20.31.6

Compare Source

Bug Fixes

v20.31.5

Compare Source

Bug Fixes

v20.31.4

Compare Source

Bug Fixes
  • Auto Mode custom tag policy should apply to cluster role, not node role (#​3242) (a07013a)

v20.31.3

Compare Source

Bug Fixes
  • Update min provider version to remediate cluster replacement when enabling EKS Auto Mode (#​3240) (012e51c)

v20.31.2

Compare Source

Bug Fixes
  • Avoid trying to attach the node role when Auto Mode nodepools are not specified (#​3239) (ce34f1d)

v20.31.1

Compare Source

Bug Fixes
  • Create EKS Auto Mode role when Auto Mode is enabled, regardless of built-in node pool use (#​3234) (e2846be)

v20.31.0

Compare Source

Features

v20.30.1

Compare Source

Bug Fixes
  • Coalesce local resolve_conflicts_on_create_default value to a boolean since default is null (#​3221) (35388bb)

v20.30.0

Compare Source

Features
  • Improve addon dependency chain and decrease time to provision addons (due to retries) (#​3218) (ab2207d)

v20.29.0

Compare Source

Features
  • Add support for pod identity association on EKS addons (#​3203) (a224334)

v20.28.0

Compare Source

Features
  • Add support for creating efa-only network interfaces (#​3196) (c6da22c)

v20.27.0

Compare Source

Features

v20.26.1

Compare Source

Bug Fixes
  • Use dynamic partition data source to determine DNS suffix for Karpenter EC2 pass role permission (#​3193) (dea6c44)

v20.26.0

Compare Source

Features
  • Add support for desired_capacity_type (named desired_size_type) on self-managed node group (#​3166) (6974a5e)

v20.25.0

Compare Source

Features
  • Add support for newly released AL2023 accelerated AMI types (#​3177) (b2a8617)
Bug Fixes

v20.24.3

Compare Source

Bug Fixes
  • Add primary_ipv6 parameter to self-managed-node-group (#​3169) (fef6555)

v20.24.2

Compare Source

Bug Fixes

v20.24.1

Compare Source

Bug Fixes
  • Correct Karpenter EC2 service principal DNS suffix in non-commercial regions (#​3157) (47ab3eb)

v20.24.0

Compare Source

Features
  • Add support for Karpenter v1 controller IAM role permissions (#​3126) (e317651)

v20.23.0

Compare Source

Features
  • Add new output values for OIDC issuer URL and provider that are dual-stack compatible (#​3120) (72668ac)

v20.22.1

Compare Source

Bug Fixes

v20.22.0

Compare Source

Features
  • Enable update in place for node groups with cluster placement group strategy (#​3045) (75db486)

v20.21.0

Compare Source

Features

v20.20.0

Compare Source

Features

v20.19.0

Compare Source

Features

v20.18.0

Compare Source

Features

v20.17.2

Compare Source

Bug Fixes

v20.17.1

Compare Source

Bug Fixes
  • Invoke aws_iam_session_context data source only when required (#​3058) (f02df92)

v20.17.0

Compare Source

Features
  • Add support for ML capacity block reservations with EKS managed node group(s) (#​3091) (ae3379e)

v20.16.0

Compare Source

Features

v20.15.0

Compare Source

Features

v20.14.0

Compare Source

Features
  • Require users to supply OS via ami_type and not via platform which is unable to distinquish between the number of variants supported today (#​3068) (ef657bf)

v20.13.1

Compare Source

Bug Fixes
  • Correct syntax for correctly ignoring bootstrap_cluster_creator_admin_permissions and not all of access_config (#​3056) (1e31929)

v20.13.0

Compare Source

Features
  • Starting with 1.30, do not use the cluster OIDC issuer URL by default in the identity provider config (#​3055) (00f076a)

v20.12.0

Compare Source

Features
  • Support additional cluster DNS IPs with Bottlerocket based AMIs (#​3051) (541dbb2)

v20.11.1

Compare Source

Bug Fixes
  • Ignore changes to bootstrap_cluster_creator_admin_permissions which is disabled by default (#​3042) (c65d308)

v20.11.0

Compare Source

Features
  • Add SourceArn condition to Fargate profile trust policy (#​3039) (a070d7b)

v20.10.0

Compare Source

Features
  • Add support for Pod Identity assocation on Karpenter sub-module (#​3031) (cfcaf27)

v20.9.0

Compare Source

Features
  • Propagate ami_type to self-managed node group; allow using ami_type only (#​3030) (74d3918)

v20.8.5

Compare Source

Bug Fixes
  • Forces cluster outputs to wait until access entries are complete (#​3000) (e2a39c0)

v20.8.4

Compare Source

Bug Fixes
  • Pass nodeadm user data variables from root module down to nodegroup sub-modules (#​2981) (84effa0)

v20.8.3

Compare Source

Bug Fixes
  • Ensure the correct service CIDR and IP family is used in the rendered user data (#​2963) (aeb9f0c)

v20.8.2

Compare Source

Bug Fixes
  • Ensure a default ip_family value is provided to guarantee a CNI policy is attached to nodes (#​2967) (29dcca3)

v20.8.1

Compare Source

Bug Fixes
  • Do not attach policy if Karpenter node role is not created by module (#​2964) (3ad19d7)

v20.8.0

Compare Source

Features
  • Replace the use of toset() with static keys for node IAM role policy attachment (#​2962) (57f5130)

v20.7.0

Compare Source

Features
  • Add supprot for creating placement group for managed node group (#​2959) (3031631)

v20.6.0

Compare Source

Features
  • Add support for tracking latest AMI release version on managed nodegroups (#​2951) (393da7e)

v20.5.3

Compare Source

Bug Fixes
  • Update AWS provider version to support AL2023_* AMI types; ensure AL2023 user data receives cluster service CIDR (#​2960) (dfe4114)

v20.5.2

Compare Source

Bug Fixes

v20.5.1

Compare Source

Bug Fixes
  • Update CI workflow versions to remove deprecated runtime warnings (#​2956) (d14cc92)

v20.5.0

Compare Source

Features

v20.4.0

Compare Source

Features

v20.3.0

Compare Source

Features
  • Add support for addon and identity provider custom tags (#​2938) (f6255c4)
20.2.2 (2024-02-21)
Bug Fixes
  • Replace Karpenter SQS policy dynamic service princpal DNS suffixes with static amazonaws.com (#​2941) (081c762)
20.2.1 (2024-02-08)
Bug Fixes
  • Karpenter enable_spot_termination = false should not result in an error (#​2907) (671fc6e)

v20.2.2

Compare Source

v20.2.1

Compare Source

v20.2.0

Compare Source

Features
  • Allow enable/disable of EKS pod identity for the Karpenter controller (#​2902) (cc6919d)
20.1.1 (2024-02-06)
Bug Fixes
  • Update access entries kubernetes_groups default value to null (#​2897) (1e32e6a)

v20.1.1

Compare Source

v20.1.0

Compare Source

Features
20.0.1 (2024-02-03)
Bug Fixes
  • Correct cluster access entry to create multiple policy associations per access entry (#​2892) (4177913)

v20.0.1

Compare Source

v20.0.0

Compare Source

⚠ BREAKING CHANGES
  • Replace the use of aws-auth configmap with EKS cluster access entry (#​2858)
Features
  • Replace the use of aws-auth configmap with EKS cluster access entry (#​2858) (6b40bdb)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

github-actions bot commented Feb 2, 2024

Terraform plan in examples/01-minimal-aws-cloudformation-bootstrap

No changes. Your infrastructure matches the configuration.
No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

📝 Plan generated in terraform-plan-01-minimal-aws-cloudformation-bootstrap #272

Copy link

github-actions bot commented Feb 2, 2024

Terraform plan in examples/03-aws-github-actions-oidc

No changes. Your infrastructure matches the configuration.
No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

📝 Plan generated in terraform-plan-03-aws-github-actions-oidc #267

Copy link

github-actions bot commented Feb 2, 2024

Terraform plan in examples/02-minimal-gcp-tf-bootstrap

No changes. Your infrastructure matches the configuration.
No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

📝 Plan generated in terraform-plan-02-minimal-gcp-tf-bootstrap #283

@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 4 times, most recently from e08f0a9 to 4e839aa Compare February 8, 2024 04:07
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from 842796d to 5bf89d1 Compare February 23, 2024 17:05
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 3 times, most recently from d69c979 to c43e51c Compare March 7, 2024 22:46
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 7 times, most recently from 81251fa to 9aeebcd Compare March 12, 2024 17:20
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch from 9aeebcd to 19bc3c4 Compare March 21, 2024 04:43
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch from 19bc3c4 to ec5b7e6 Compare April 9, 2024 02:42
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from 7ef469d to 9f0810c Compare May 9, 2024 12:30
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from 10f866f to f398555 Compare May 22, 2024 01:32
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 3 times, most recently from 197c7ff to b62f394 Compare June 4, 2024 12:08
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch from b62f394 to 73f4e53 Compare June 13, 2024 12:57
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch from 73f4e53 to 7ac7319 Compare June 27, 2024 13:58
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from ef70cc4 to c0bf9ff Compare July 5, 2024 18:50
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from 59262a4 to 29f0303 Compare July 19, 2024 15:43
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 4 times, most recently from 8a5957b to dca2874 Compare August 10, 2024 00:16
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch from dca2874 to fad5d93 Compare August 19, 2024 23:19
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from dfe3843 to 6009460 Compare September 21, 2024 15:47
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch from 6009460 to 4d1bb9c Compare October 3, 2024 16:52
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from a40df1e to edfcfc7 Compare October 12, 2024 18:08
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from d6c3aba to 259b4c5 Compare November 2, 2024 17:38
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch from 259b4c5 to ed44178 Compare November 9, 2024 01:57
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch from ed44178 to 7525fb7 Compare November 26, 2024 21:10
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from ae794e4 to 0a2312d Compare December 9, 2024 07:43
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 4 times, most recently from a0c367c to 3f24af1 Compare December 17, 2024 15:36
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from c2f5ecd to fa171d0 Compare December 21, 2024 01:02
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch 2 times, most recently from d68cbb0 to 7e00731 Compare January 17, 2025 21:01
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-eks-aws-20.x branch from 7e00731 to e557176 Compare January 22, 2025 01:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants