Releases: cloudposse/terraform-aws-helm-release
Releases · cloudposse/terraform-aws-helm-release
v0.2.0
🚀 Enhancements
Feat: add feature flag for dynamically setting ServiceAccount Role ARN annotation @korenyoni (#10)
what
- Add feature flag for dynamically setting ServiceAccount Role ARN annotation, which is set to
true
by default. - Misc: change wording for
var.service_account_namespace
to avoid confusion betweenvar.namespace
andvar.kubernetes_namespace
.
why
- Assuming the Helm Chart follows the standard convention of rendering ServiceAccount annotations in
serviceAccount.annotations
, this allows the ServiceAccount created by the Helm Chart to assume the IAM Role in question via the EKS OIDC IdP, without the consumer of this module having to set this annotation viavar.values
orvar.set
, which would involve manually rendering the IAM Role ARN beforehand (since not doing so would introduce a cycle in the graph).
references
- N/A
v0.1.4
🚀 Enhancements
Fix: fix documentation for `service_account_*` variables @korenyoni (#9)
what
- Expand on variable descriptions for
service_acount_*
variables. - Fix usage snippet to promote best practice for
service_acount_*
variables.
why
- The usage snippet is currently promoting to leave
service_account_*
variables asnull
, which leads to scenario 5 described by eks-iam-role, which allows all ServiceAccounts in all namespaces to assume the IAM role created by this module. The variables in question do not have sufficient documentation to explain why this is a poor practice, and what the best practice is.
references
v0.1.3
🚀 Enhancements
Chore: bump `iam-policy` and `eks-iam-role` versions @korenyoni (#8)
what
- Bump
iam-policy
,eks-iam-role
module versions to latest.
why
- These modules need to be updated because they are using a version of
context.tf
that is older than0.25.0
, and hence not compatible with thetenant
label.
references
v0.1.2
🚀 Enhancements
iam-policy-0.2.1 and context 0.25.0 @nitrocode (#5)
what
- iam-policy-0.2.1
- context 0.25.0 via
make github/init
- eks-iam-role 0.10.1
why
- Upgrade
references
v0.1.1
🤖 Automatic Updates
Update Terraform cloudposse/eks-iam-role/aws to v0.10.0 @renovate (#2)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/eks-iam-role/aws (source) | module | minor | 0.8.0 -> 0.10.0 |
Release Notes
cloudposse/terraform-aws-eks-iam-role
v0.10.0
Make `aws_account_number` optional @nitrocode (#18)
##### what * Make `aws_account_number` optional ##### why * Sometimes you want to use the aws account number that the aws provider profile is using. ##### references N/Av0.9.0
Make `aws_iam_policy_document` optional @nitrocode (#16)
#### what * Empty `aws_iam_policy_document` #### why * Create a role without any policy document #### references * See #15 #### testmodule "eks_iam_role" {
### source = "cloudposse/eks-iam-role/aws"
### Cloud Posse recommends pinning every module to a specific version
### version = "x.x.x"
source = "git::https://github.com/cloudposse/terraform-aws-eks-iam-role.git?ref=null_aws_iam_policy_document"
aws_account_number = local.account_id
eks_cluster_oidc_issuer_url = module.eks_cluster.eks_cluster_identity_oidc_issuer
### Create a role for the service account named `autoscaler` in the Kubernetes namespace `kube-system`
service_account_name = "autoscaler"
service_account_namespace = "kube-system"
}
Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- If you want to rebase/retry this PR, check this box.
This PR has been generated by WhiteSource Renovate. View repository job log here.
0.1.0: Initial commit (#1)
* Initial commit Co-authored-by: cloudpossebot <[email protected]> Co-authored-by: Yonatan Koren <[email protected]>