-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
feat!: Upgrade AWS provider and min required Terraform version to 6.0
and 1.5.7
respectively
#585
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
bryantbiggs
merged 21 commits into
terraform-aws-modules:master
from
clowdhaus:feat/upgrade-pt2
Aug 13, 2025
Merged
feat!: Upgrade AWS provider and min required Terraform version to 6.0
and 1.5.7
respectively
#585
bryantbiggs
merged 21 commits into
terraform-aws-modules:master
from
clowdhaus:feat/upgrade-pt2
Aug 13, 2025
+5,565
−9,337
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4352d9b
to
bb2a465
Compare
7baf566
to
a2a875d
Compare
a2a875d
to
9b381af
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lots of awesome stuff! :)
antonbabenko
approved these changes
Aug 13, 2025
antonbabenko
pushed a commit
that referenced
this pull request
Aug 13, 2025
## [6.0.0](v5.60.0...v6.0.0) (2025-08-13) ### ⚠ BREAKING CHANGES * Upgrade AWS provider and min required Terraform version to `6.0` and `1.5.7` respectively (#585) ### Features * Upgrade AWS provider and min required Terraform version to `6.0` and `1.5.7` respectively ([#585](#585)) ([31b31d7](31b31d7))
This PR is included in version 6.0.0 🎉 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
List of backwards incompatible changes
See the
docs/UPGRADE-6.0.md
guide for more detailsTerraform
v1.5.7
is now minimum supported versionAWS provider
v6.0.0
is now minimum supported versionThe ability to allow roles to assume their own roles has been removed. This was previously added as part of helping users mitigate https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/. Going forward, users will need to mitigate this on the application side (i.e. - do not have a role assume itself), or update the trust policy in their implementation to continue using this behavior. It is strongly recommended to mitigate this by not having the role assume itself.
iam-account
:aws_caller_identity
data source and associated outputs have been removed. Users should instead use the data source directly in their configurationiam-assumable-role
has been renamed toiam-role
iam-assumable-role-with-oidc
has been merged intoiam-role
iam-assumable-role-with-saml
has been merged intoiam-role
iam-assumable-roles
has been removed;iam-role
should be used insteadiam-assumable-roles-with-saml
has been removed;iam-role
should be used insteadiam-github-oidc-provider
has been renamed toiam-oidc-provider
iam-github-oidc-role
has been merged intoiam-role
iam-group-with-policies
has been renamed toiam-group
iam-group-with-assumable-roles-policy
has been merged intoiam-group
iam-eks-role
has been removed;iam-role-for-service-accounts
oreks-pod-identity
should be used insteadiam-policy
has been removed; theaws_iam_policy
resource should be used directly insteadiam-role-for-service-accounts-eks
has been renamed toiam-role-for-service-accounts
Additional changes
Modified
Variable definitions now contain detailed
object
types in place of the previously used any typeiam-group
permissions
true
instead offalse
iam-role
trust_policy_permissions
variable. This allows for any number of custom statements to be added to the role's trust policy.custom_role_policy_arns
has been renamed topolicies
and now accepts a map ofname
:policy-arn
pairs; this allows for both existing policies and policies that will get created at the same time as the role. This also replaces the admin, readonly, and poweruser policy ARN variables and their associatedattach_*_policy
variables.true
instead offalse
force_detach_policies
has been removed; this is now alwaystrue
iam-role-for-service-accounts
Motivation and Context
Breaking Changes
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request