You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/UPGRADE-6.0.md
+93Lines changed: 93 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,8 @@ If you find a bug, please open an issue with supporting configuration to reprodu
6
6
7
7
## List of backwards incompatible changes
8
8
9
+
-`iam-account`:
10
+
- The `aws_caller_identity` data source and associated outputs have been removed. Users should instead use the data source directly in their configuration
9
11
-`iam-assumable-role` has been renamed to `iam-role`
10
12
-`iam-assumable-role-with-oidc` has been merged into `iam-role`
11
13
-`iam-assumable-role-with-saml` has been merged into `iam-role`
@@ -17,6 +19,10 @@ If you find a bug, please open an issue with supporting configuration to reprodu
17
19
-`iam-group-with-assumable-roles-policy` has been merged into `iam-group`
18
20
-`iam-eks-role` has been removed; `iam-role-for-service-accounts` or [`eks-pod-identity`](https://github.com/terraform-aws-modules/terraform-aws-eks-pod-identity) should be used instead
19
21
-`iam-policy` has been removed; the `aws_iam_policy` resource should be used directly instead
22
+
-`iam-role-for-service-accounts`:
23
+
- Individual policy creation and attachment has been consolidated under one policy creation and attachment
24
+
- Default values that enable permissive permissions have been removed; users will need to be explicit about the scope of access (i.e. ARNs) they provide when enabling permissions
25
+
- AppMesh policy support has been removed due to service reaching end of support
20
26
21
27
```mermaid
22
28
stateDiagram
@@ -69,6 +75,8 @@ stateDiagram
69
75
70
76
1. Removed variables:
71
77
78
+
-`iam-account`
79
+
-`get_caller_identity`
72
80
-`iam-role`
73
81
-`trusted_role_actions`
74
82
-`trusted_role_arns`
@@ -85,6 +93,24 @@ stateDiagram
85
93
-`iam-group`
86
94
-`custom_group_policies`
87
95
-`assumable_roles`
96
+
-`iam-oidc-provider`
97
+
-`additional_thumbprints` - no longer required by GitHub
98
+
-`iam-role-for-service-accounts`
99
+
-`cluster_autoscaler_cluster_ids` - use `cluster_autoscaler_cluster_names` instead
100
+
-`role_name_prefix` - functionality covered under `name`
101
+
-`policy_name_prefix` - functionality covered under `policy_name`
-`assume_role_policy_statements` which allows for any number of custom statements to be added to the role's trust policy. This covers the majority of the variables that were removed
111
157
-`iam-group`
112
158
-`permission_statements` which allows for any number of custom statements to be added to the role's trust policy. This covers the majority of the variables that were removed
Copy file name to clipboardExpand all lines: modules/iam-role-for-service-accounts/README.md
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,29 @@
1
-
# AWS IAM Role for Service Accounts in EKS Terraform Module
1
+
# AWS IAM Role for EKS Service Accounts Terraform Module
2
+
3
+
> [!TIP]
4
+
> Upgrade to use EKS Pod Identity instead of IRSA
5
+
> A similar module for EKS Pod Identity is available [here](https://github.com/terraform-aws-modules/terraform-aws-eks-pod-identity).
6
+
7
+
> [!INFO]
8
+
> The [karpenter](https://github.com/terraform-aws-modules/terraform-aws-eks/tree/master/modules/karpenter) sub-module contains the necessary AWS resources for running Karpenter, including the Karpenter controller IAM role & policy
2
9
3
10
Creates an IAM role which can be assumed by AWS EKS `ServiceAccount`s with optional policies for commonly used controllers/custom resources within EKS. The optional policies supported include:
This module is intended to be used with AWS EKS. For details of how a `ServiceAccount` in EKS can assume an IAM role, see the [EKS documentation](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html).
22
28
23
29
This module supports multiple `ServiceAccount`s across multiple clusters and/or namespaces. This allows for a single IAM role to be used when an application may span multiple clusters (e.g. for DR) or multiple namespaces (e.g. for canary deployments). For example, to create an IAM role named `my-app` that can be assumed from the `ServiceAccount` named `my-app-staging` in the namespace `default` and `canary` in a cluster in `us-east-1`; and also the `ServiceAccount` name `my-app-staging` in the namespace `default` in a cluster in `ap-southeast-1`, the configuration would be:
0 commit comments