You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Creates an IAM role that is suitable for EKS IAM role for service accounts (IRSA) with a set of pre-defined policies for common EKS addons.
108
+
Creates an IAM role with a trust policy and (optional) IAM instance profile. Useful for service roles such as EC2, ECS, etc., or roles assumed across AWS accounts.
Creates an IAM role with a trust policy and (optional) IAM instance profile. Useful for service roles such as EC2, ECS, etc., or roles assumed across AWS accounts.
195
+
Creates an IAM role that is suitable for EKS IAM role for service accounts (IRSA) with a set of pre-defined policies for common EKS addons.
-[iam-read-only-policy](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-read-only-policy) - Create IAM read-only policy
250
247
-[iam-role](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-role) - Create individual IAM role which can be assumed from specified ARNs (AWS accounts, IAM users, etc)
251
248
-[iam-role-for-service-accounts](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-role-for-service-accounts) - Create IAM role for service accounts (IRSA) for use within EKS clusters
252
-
-[iam-role-saml](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-role-saml) - Create individual IAM role which can be assumed by users with a SAML Identity Provider
253
249
-[iam-user](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-user) - Add IAM user, login profile and access keys (with PGP enabled or disabled)
Copy file name to clipboardExpand all lines: docs/UPGRADE-6.0.md
+5-59Lines changed: 5 additions & 59 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,14 +7,14 @@ If you find a bug, please open an issue with supporting configuration to reprodu
7
7
## List of backwards incompatible changes
8
8
9
9
-`iam-assumable-role` has been renamed to `iam-role`
10
-
-`iam-assumable-role-with-oidc` has been renamed to`iam-role-oidc`
11
-
-`iam-assumable-role-with-saml` has been renamed to`iam-role-saml`
10
+
-`iam-assumable-role-with-oidc` has been merged into`iam-role`
11
+
-`iam-assumable-role-with-saml` has been merged into`iam-role`
12
12
-`iam-assumable-roles` has been removed; `iam-role` should be used instead. See the [`iam-role` example](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-role) that shows an example replacement implementation.
13
-
-`iam-assumable-roles-with-saml` has been removed; `iam-role-saml` should be used instead. See the [`iam-role-saml` example](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-role-saml) that shows an example replacement implementation.
13
+
-`iam-assumable-roles-with-saml` has been removed; `iam-role` should be used instead. See the [`iam-role` example](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-role-saml) that shows an example replacement implementation.
14
14
-`iam-github-oidc-provider` has been renamed to `iam-oidc-provider`
15
-
-`iam-github-oidc-role` has been removed; `iam-role-oidc` should be used instead. See the [`iam-oidc-provider` example](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-oidc-provider)
15
+
-`iam-github-oidc-role` has been merged into `iam-role`. See the [`iam-oidc-provider` example](https://github.com/terraform-aws-modules/terraform-aws-iam/tree/master/examples/iam-oidc-provider)
16
16
-`iam-group-with-assumable-roles-policy` has been removed; the renamed `iam-group` (was `iam-group-with-policies`) should be used instead
17
-
-`iam-eks-role` has been removed; `iam-role-for-service-accounts-eks` should be used instead
17
+
-`iam-eks-role` has been removed; `iam-role-for-service-accounts` should be used instead
18
18
-`iam-policy` has been removed; the `aws_iam_policy` resource should be used directly instead
19
19
20
20
## Additional changes
@@ -26,14 +26,6 @@ If you find a bug, please open an issue with supporting configuration to reprodu
26
26
-`custom_role_policy_arns` has been renamed to `policies` and now accepts a map of `name`: `policy-arn` pairs; this allows for both existing policies and policies that will get created at the same time as the role. This also replaces the admin, readonly, and poweruser policy ARN variables and their associated `attach_*_policy` variables.
27
27
- Default create conditional is now `true` instead of `false`
28
28
-`force_detach_policies` has been removed; this is now always `true`
29
-
-`iam-role-oidc`
30
-
-`custom_role_policy_arns` has been renamed to `policies` and now accepts a map of `name`: `policy-arn` pairs; this allows for both existing policies and policies that will get created at the same time as the role.
31
-
- Default create conditional is now `true` instead of `false`
32
-
-`force_detach_policies` has been removed; this is now always `true`
33
-
-`iam-role-saml`
34
-
-`custom_role_policy_arns` has been renamed to `policies` and now accepts a map of `name`: `policy-arn` pairs; this allows for both existing policies and policies that will get created at the same time as the role.
35
-
- Default create conditional is now `true` instead of `false`
36
-
-`force_detach_policies` has been removed; this is now always `true`
37
29
-`iam-group`
38
30
- Policy management has been updated to support extending the policy created by the sub-module, as well as adding additional policies that will be attached to the group
39
31
- The role assumption permissions has been removed from the policy; users can extend the policy to add this if needed via `permission_statements`
@@ -56,12 +48,6 @@ If you find a bug, please open an issue with supporting configuration to reprodu
@@ -106,10 +74,6 @@ If you find a bug, please open an issue with supporting configuration to reprodu
106
74
107
75
-`iam-role`
108
76
-`assume_role_policy_statements` which allows for any number of custom statements to be added to the role's trust policy. This covers the majority of the variables that were removed
109
-
-`iam-role-oidc`
110
-
-`assume_role_policy_statements` which allows for any number of custom statements to be added to the role's trust policy. This covers the majority of the variables that were removed
111
-
-`iam-role-saml`
112
-
-`assume_role_policy_statements` which allows for any number of custom statements to be added to the role's trust policy. This covers the majority of the variables that were removed
113
77
-`iam-group`
114
78
-`permission_statements` which allows for any number of custom statements to be added to the role's trust policy. This covers the majority of the variables that were removed
115
79
-`path`/`policy_path`
@@ -123,12 +87,6 @@ If you find a bug, please open an issue with supporting configuration to reprodu
0 commit comments