Skip to content

Releases: cloudposse/terraform-aws-eks-cluster

v2.9.0

13 Jul 22:33
9d540b3
Compare
Choose a tag to compare
Enable configuration values to be passed to addons @Nuru (#191)

notes

This version bumps requirements:

  • Terraform must now be >= 1.3
  • AWS provider must now be >= 4.46

Even with that, there is still a deprecation warning when using AWS provider v5. We are providing this release at this level for people who are not yet ready to update to AWS provider v5. Most likely the next release will required v5.

what

  • Enable configuration values to be passed to addons
  • Wait for security group rules to be in place before trying to contact the cluster
  • Update test go version and dependencies

why

  • Add-ons may need configuration. For example, to run coredns on Fargate, you must pass '{"computeType": "Fargate"}'. Supersedes and closes #181
  • Before security group rules are in place, TCP connection to the cluster will be blocked and the connection will fail.
  • Supersede and close the following PRs:

references

Supersedes and closes #190

v2.8.1

24 May 21:19
c8a4adf
Compare
Choose a tag to compare

🚀 Enhancements

Update Security Group rules @aknysh (#186)

what

  • Update Security Group rules

why

  • This module can create an additional Security Group for the EKS cluster for backwards compatibility if you are updating this module to the latest version on existing clusters
  • If the cluster was created using an older version of the module, EKS did not create a managed cluster Security Group at the time, and the the cluster Security Group was the additional Security Group
  • This additional Security Group is returned from the expression one(aws_eks_cluster.default[*].vpc_config[0].cluster_security_group_id)
  • When the module tries to create resource "aws_security_group_rule" "managed_ingress_cidr_blocks" to add the allowed ingress CIDR blocks, the following error is thrown
 Error: [WARN] A duplicate Security Group rule was found on (sg-xxxxxxxxx). This may be
│ a side effect of a now-fixed Terraform issue causing two security groups with
│ identical attributes but different source_security_group_ids to overwrite each
│ other in the state. See https://github.com/hashicorp/terraform/pull/2376 for more
│ information and instructions for recovery. Error: InvalidPermission.Duplicate: the specified rule "peer: 10.222.0.0/16, ALL, ALLOW" already exists
│ 	status code: 400, request id: 7065e36d-ffca-4540-8e43-ed75d94d752e
│
│   with module.eks_cluster.aws_security_group_rule.managed_ingress_cidr_blocks[0],
│   on .terraform/modules/eks_cluster/security-group.tf line 17, in resource "aws_security_group_rule" "managed_ingress_cidr_blocks":
│   17: resource "aws_security_group_rule" "managed_ingress_cidr_blocks" {
  • This PR adds a variable managed_security_group_rules_enabled. For the very old clusters (which use the custom SG as the main cluster SG), set the variable to false to not add the SG rules to it (since the SG is the custom SG to which the module adds the same rules anyway)

v2.8.0

20 May 19:05
c0993cc
Compare
Choose a tag to compare
Improved dependency configuration @Nuru (#185)

what

  • Add addons_depends_on to allow for nodes to be created before addons are applied
  • Add cluster_depends_on to allow for networking to be fully provisioned before cluster is created
  • Improve internal depends_on clauses
  • Fix tflint complaints

why

  • Fixes #170
  • May improve destruction when network and cluster are provisioned at the same time
  • Maintain access if destruction only partly succeeds
Sync github @max-lobur (#184)

Rebuild github dir from the template

v2.7.0

17 May 09:15
fa9667a
Compare
Choose a tag to compare
  • No changes

v2.6.0

02 Nov 06:02
fa9667a
Compare
Choose a tag to compare
Add cluster_attributes variable to change cluster attribute @asmithdt (#172)

what

  • Add cluster_attributes variable to change cluster attribute

why

  • If migrating to this module the cluster name may not end with -cluster and it's neccessary to override the name of the resource.

references

v2.5.0

17 Oct 22:21
1c44f2c
Compare
Choose a tag to compare

🐛 Bug Fixes

Better behavior during destroy @Nuru (#169)

what

  • Improve behavior during terraform destroy
  • Update documentation

why

  • Clusters should destroy cleanly, but previously did not
  • Documentation referred to old examples, wrong security group

references

v2.4.0

16 Aug 20:58
77f8aa0
Compare
Choose a tag to compare
Custom Ingress rules @IkePCampbell (#162)

what

  • Added list of objects, which are Security Rule Ingress Definitions.

why

  • Sometimes I need to add security groups to access my EKS workers, such as other EC2 instances on a variety of ports. Same with RDS instances.

references

  • Link to any supporting github issues or helpful documentation to add some context (e.g. stackoverflow).
  • Use closes #123, if this PR closes a GitHub issue #123

v2.3.2

25 Jul 20:43
7880f77
Compare
Choose a tag to compare

🐛 Bug Fixes

Exclude only TLS provider version 4.0.0 @Nuru (#160)

what && why

  • In #158 we disallowed all TLS provider version >= 4.0.0 due to hashicorp/terraform-provider-tls#244 . In this release we exclude only 4.0.0 exactly because the bug was fixed in 4.0.1.
  • Upgrade go test dependencies to current to pick up bug and security fixes.

references

v2.3.1

25 Jul 04:24
d5a29cf
Compare
Choose a tag to compare
Bump sigs.k8s.io/aws-iam-authenticator from 0.5.3 to 0.5.9 in /test/src @dependabot (#156)

Bumps sigs.k8s.io/aws-iam-authenticator from 0.5.3 to 0.5.9.

Release notes

Sourced from sigs.k8s.io/aws-iam-authenticator's releases.

v0.5.9

Changelog

  • 1209cfe2 Bump version in Makefile
  • 029d1dcf Add query parameter validation for multiple parameters

v0.5.7

What's Changed

New Contributors

Full Changelog: kubernetes-sigs/aws-iam-authenticator@v0.5.6...v0.5.7

v0.5.6

Changelog

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.6
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.6-arm64
  • docker pull 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-iam-authenticator:v0.5.6-amd64

v0.5.5

Changelog

Docker Images

Note: You must log in with the registry ID and your role must have the necessary ECR privileges:

$(aws ecr get-login --no-include-email --region us-west-2 --registry-ids 602401143452)

... (truncated)

Commits
  • 1209cfe Bump version in Makefile
  • 029d1dc Add query parameter validation for multiple parameters
  • 0a72c12 Merge pull request #455 from jyotimahapatra/rev2
  • 596a043 revert use of upstream yaml parsing
  • 2a9ee95 Merge pull request #448 from jngo2/master
  • fc4e6cb Remove unused imports
  • f0fe605 Remove duplicate InitMetrics
  • 99f04d6 Merge pull request #447 from nckturner/release-0.5.6
  • 9dcb6d1 Faster multiarch docker builds
  • a9cc81b Bump timeout for image build job
  • Additional commits viewable in compare view

🐛 Bug Fixes

Disallow TLS provider v4 due to provider issue 244 @Nuru (#158)

what

  • Disallow hashicorp/tls provider version >= 4.0.0

why

When using hashicorp/tls provider v4.0.0 and setting oidc_provider_enabled = true on a new EKS cluster deployment, terraform plan will fail with thumbprint_list = [join("", data.tls_certificate.cluster.*.certficates.0.sha1_fingerprint)] and The given key does not identify an element in this collection value: the collection has no elements.

references

v2.3.0

08 Jun 20:13
a43962e
Compare
Choose a tag to compare
Add IPv6 support @Nuru (#154)

what && why

  • Add IPv6 support. Closes #142
  • Update Kubernetes exec auth API to client.authentication.k8s.io/v1beta1. Resolves #131
  • [framework] Update renovate.json to auto-close #129
Clarify cluster authentication options @Nuru (#153)

what

  • Clarify cluster authentication options

why

  • Better explanation of confusing issue