Skip to content

Releases: terraform-aws-modules/terraform-aws-iam

v6.1.1

18 Aug 12:07
Compare
Choose a tag to compare

6.1.1 (2025-08-18)

Bug Fixes

  • Remove any secretsmanager:* permissions if no secret ARNs are provided to IRSA external-secrets permissions (#599) (d610954)

v6.1.0

14 Aug 21:53
Compare
Choose a tag to compare

6.1.0 (2025-08-14)

Features

  • Add default IRSA policy name, fix incorrect policy attachment for iam-user (#594) (f111832)

v6.0.1

14 Aug 17:01
Compare
Choose a tag to compare

6.0.1 (2025-08-14)

Bug Fixes

  • Remove broken IRSA migrations.tf; add default IRSA policy descriptions for backwards compat (#592) (e56f84d)

v6.0.0

13 Aug 19:51
Compare
Choose a tag to compare

6.0.0 (2025-08-13)

âš  BREAKING CHANGES

  • Upgrade AWS provider and min required Terraform version to 6.0 and 1.5.7 respectively (#585)

See docs/UPGRADE-6.0.md for further details

List of backwards incompatible changes

  • Terraform v1.5.7 is now minimum supported version

  • AWS provider v6.0.0 is now minimum supported version

  • The ability to allow roles to assume their own roles has been removed. This was previously added as part of helping users mitigate https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/. Going forward, users will need to mitigate this on the application side (i.e. - do not have a role assume itself), or update the trust policy in their implementation to continue using this behavior. It is strongly recommended to mitigate this by not having the role assume itself.

  • iam-account:

    • The aws_caller_identity data source and associated outputs have been removed. Users should instead use the data source directly in their configuration
  • iam-assumable-role has been renamed to iam-role

  • iam-assumable-role-with-oidc has been merged into iam-role

  • iam-assumable-role-with-saml has been merged into iam-role

  • iam-assumable-roles has been removed; iam-role should be used instead

  • iam-assumable-roles-with-saml has been removed; iam-role should be used instead

  • iam-github-oidc-provider has been renamed to iam-oidc-provider

  • iam-github-oidc-role has been merged into iam-role

  • iam-group-with-policies has been renamed to iam-group

  • iam-group-with-assumable-roles-policy has been merged into iam-group

  • iam-eks-role has been removed; iam-role-for-service-accounts or eks-pod-identity should be used instead

  • iam-role-for-service-accounts-eks has been renamed to iam-role-for-service-accounts

    • Individual policy creation and attachment has been consolidated under one policy creation and attachment
    • Default values that enable permissive permissions have been removed; users will need to be explicit about the scope of access (i.e. ARNs) they provide when enabling permissions
    • AppMesh policy support has been removed due to service reaching end of support

Additional changes

Modified

  • Variable definitions now contain detailed object types in place of the previously used any type

  • iam-group

    • Policy management has been updated to support extending the policy created by the sub-module, as well as adding additional policies that will be attached to the group
    • The role assumption permissions has been removed from the policy; users can extend the policy to add this if needed via permissions
    • Default create conditional is now true instead of false
  • iam-role

    • The use of individual variables to control/manipulate the assume role trust policy have been replaced by a generic trust_policy_permissions variable. This allows for any number of custom statements to be added to the role's trust policy.
    • custom_role_policy_arns has been renamed to policies and now accepts a map of name: policy-arn pairs; this allows for both existing policies and policies that will get created at the same time as the role. This also replaces the admin, readonly, and poweruser policy ARN variables and their associated attach_*_policy variables.
    • Default create conditional is now true instead of false
    • force_detach_policies has been removed; this is now always true
    • Support for inline policies has been added
  • iam-role-for-service-accounts

    • Support for inline policies has been added

v5.60.0

08 Aug 14:53
Compare
Choose a tag to compare

5.60.0 (2025-08-08)

Features

  • Add ssm:GetParametersByPath for external secrets (#583) (8e4541d)

v5.59.0

05 Jul 14:58
Compare
Choose a tag to compare

5.59.0 (2025-07-05)

Features

  • Update EBS CSI IAM policy to match current upstream project (#575) (49efa8c)

v5.58.0

04 Jun 19:59
Compare
Choose a tag to compare

5.58.0 (2025-06-04)

Features

v5.57.0

04 Jun 19:38
Compare
Choose a tag to compare

5.57.0 (2025-06-04)

Features

  • Update IAM policy for AWS Gateway Controller (#563) (343e5fe)

v5.56.0

04 Jun 19:24
Compare
Choose a tag to compare

5.56.0 (2025-06-04)

Features

  • Update AWS Load Balancer controller policy to match v2.13 of the upstream project (#573) (4ce604e)

v5.55.0

14 Apr 18:39
Compare
Choose a tag to compare

5.55.0 (2025-04-14)

Features

  • Allow removing KMS and SSM permissions from EKS IRSA external secrets policy (#550) (bfaa70d)