Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update terraform terraform-aws-modules/iam/aws to v5 #30

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Aug 15, 2023

This PR contains the following updates:

Package Type Update Change
terraform-aws-modules/iam/aws (source) module major ~> 3.0 -> ~> 5.0
terraform-aws-modules/iam/aws (source) module major ~> 4.2 -> ~> 5.0

Release Notes

terraform-aws-modules/terraform-aws-iam (terraform-aws-modules/iam/aws)

v5.47.1

Compare Source

Bug Fixes

v5.47.0

Compare Source

Features
Bug Fixes

v5.46.0

Compare Source

Features
  • Update IAM policy for AWS Load Balancer Controller to support Listener Attributes (#​525) (966c4f8)

v5.45.0

Compare Source

Features
  • Allow modifying the iam-github-oidc-role subject condition (#​523) (f2ade86)

v5.44.2

Compare Source

Bug Fixes
  • Add required S3 PutObjectTagging permission to Velero IRSA policy (#​517) (f0e65a7)

v5.44.1

Compare Source

Bug Fixes

v5.44.0

Compare Source

Features

v5.43.0

Compare Source

Features

v5.42.0

Compare Source

Features
  • Add cloudwatch logs policy to vpc-cni for networkpolicy logging (#​504) (88ee443)

v5.41.0

Compare Source

Features
  • Adding sse-kms support for Mountpoint S3 CSI driver EKS IRSA (#​493) (5039e10)

v5.40.0

Compare Source

Features

v5.39.1

Compare Source

Bug Fixes
  • Fixed trust condition in modules/iam-github-oidc-role to be https (#​490) (ecaed18)

v5.39.0

Compare Source

Features

v5.38.0

Compare Source

Features
  • EBS fast snapshot restores persmission for EKS IRSA (#​469) (9ea77ca)

v5.37.2

Compare Source

Bug Fixes
  • Allow user to change own password when no MFA is present (#​470) (ef0056b)

v5.37.1

Compare Source

Bug Fixes
  • Update CI workflow versions to remove deprecated runtime warnings (#​465) (82348df)

v5.37.0

Compare Source

Features
  • Extend self-management policy to read account summary (iam-group-with-policies) (#​462) (0bedaf4)

v5.36.0

Compare Source

Features
  • Add support for Mountpoint S3 CSI driver to EKS IRSA (#​459) (21fb8d9)

v5.35.0

Compare Source

Features
  • Allow users to set and read own access keys description (iam-group-with-policies) (#​461) (c80cd10)

v5.34.0

Compare Source

Features
5.33.1 (2024-01-18)
Bug Fixes
  • Skip retrieving EKS cluster data when not creating the role (#​436) (bcdf554)

v5.33.1

Compare Source

v5.33.0

Compare Source

Features
  • Add support for Amazon CloudWatch Observability IRSA role (#​446) (25e2bf9)
5.32.1 (2023-12-11)
Bug Fixes
  • Remove unused TLS provider in iam-github-oidc-role (#​439) (2ce3885)

v5.32.1

Compare Source

v5.32.0

Compare Source

Features

v5.31.0

Compare Source

Features
  • Allow users to change own password in iam-group-with-policies module (#​435) (eb5b218)
5.30.2 (2023-11-10)
Bug Fixes
5.30.1 (2023-11-04)
Bug Fixes
  • Direct policy attachment of iam-policy-created resources (#​428) (543f101)

v5.30.2

Compare Source

v5.30.1

Compare Source

v5.30.0

Compare Source

Features
  • Add create_custom_role_trust_policy to control when a custom_role_trust_policy should be used (#​321) (481095e)
5.29.2 (2023-08-30)
Bug Fixes
  • Expand Permissions for external-secrets IRSA Policy towards AWS Secrets Manager (#​416) (fa74a18)
5.29.1 (2023-08-30)
Bug Fixes
  • Add missing condition role_session_name when assuming a role (#​418) (89d011e)

v5.29.2

Compare Source

v5.29.1

Compare Source

v5.29.0

Compare Source

Features
  • Add variable for adding statement for secretsmanager:CreateSecret (#​414) (24996cd)

v5.28.0

Compare Source

Features
  • Added direct policy attachment in iam-user module (#​387) (9fa481f)

v5.27.0

Compare Source

Features

v5.26.0

Compare Source

Features

v5.25.0

Compare Source

Features
  • Added variable load_balancer_controller_targetgroup_arns in iam-role-for-service-accounts-eks module (#​402) (61a5dbe)

v5.24.0

Compare Source

Features
5.23.1 (2023-06-29)
Bug Fixes

v5.23.1

Compare Source

v5.23.0

Compare Source

Features
  • Added variable trusted_role_actions to sub modules as a "Action of STS" (#​393) (5702679)

v5.22.0

Compare Source

Features

v5.21.0

Compare Source

Features
  • Added permissions to list zone tags in iam-role-for-service-accounts-eks module (#​394) (740945f)

v5.20.0

Compare Source

Features
  • Add support for AWS Gateway controller (VPC Lattice) to IRSA module (#​378) (fdee003)

v5.19.0

Compare Source

Features
  • Add support for condition role_session_name when assuming a role (#​379) (5aabe67)

v5.18.0

Compare Source

Features
  • iam-eks-role: Add variable to allow change of IAM assume role condition test operator (#​367) (542fc5a)
5.17.1 (2023-05-05)
Bug Fixes
  • Remove "autoscaling:UpdateAutoScalingGroup" permission from cluster-autoscaler IRSA (#​357) (aeb5d7f)

v5.17.1

Compare Source

v5.17.0

Compare Source

Features
  • Add name_prefix to iam-policy and iam-read-only-policy modules (#​369) (5bf5f6f)

v5.16.0

Compare Source

Features
  • Add elasticloadbalancing:AddTags permissions to AWS Load Balancer Controller policy required for version 2.4.7+ (#​358) (e1403c1)

v5.15.0

Compare Source

Features
  • Add permissions for instance requirements support for cluster autoscaler IRSA policy (#​356) (fac0cdc)
5.14.4 (2023-03-24)
Bug Fixes
5.14.3 (2023-03-23)
Bug Fixes
  • Do not attach force MFA statement for iam-groups-with-policies by default (#​333) (b9f3409)
5.14.2 (2023-03-21)
Bug Fixes
  • Add ssm:DescribeParameters permission to external-secrets IAM role for service account (IRSA) (#​348) (fe8d73b)
5.14.1 (2023-03-21)
Bug Fixes
  • Update self manage policy to support users with path (#​335) (9a8d5cb)

v5.14.4

Compare Source

v5.14.3

Compare Source

v5.14.2

Compare Source

v5.14.1

Compare Source

v5.14.0

Compare Source

Features
  • Update efs_csi policy to support resource tagging (#​352) (47cb7a2)

v5.13.0

Compare Source

Features
  • Add support for path in iam-group-with-assumable-roles-policy (#​345) (761368e)

v5.12.0

Compare Source

Features
  • Add eks:DescribeCluster for Karpenter cluster endpoint auto discovery (#​343) (3f2cdc8)
5.11.2 (2023-02-15)
Bug Fixes
5.11.1 (2023-01-19)
Bug Fixes

v5.11.2

Compare Source

v5.11.1

Compare Source

v5.11.0

Compare Source

Features
  • Allow multiple MFA devices and users to manage MFA devices (#​313) (57a5d70)

v5.10.0

Compare Source

Features
  • Added Extra STS actions param in assumable role with SAML (#​317) (a2ad4cd)
Bug Fixes
  • Use a version for to avoid GitHub API rate limiting on CI workflows (#​323) (90349fa)
5.9.2 (2022-12-10)
Bug Fixes
5.9.1 (2022-12-07)
Bug Fixes
  • Add ssm:GetParameters permission to external-secrets policy (#​316) (0e77849)

v5.9.2

Compare Source

v5.9.1

Compare Source

v5.9.0

Compare Source

Features

v5.8.0

Compare Source

Features
  • Add additional permissions to Karpenter EKS IRSA role for native node termination handling support (#​304) (d6865d2)

v5.7.0

Compare Source

Features
  • Ensure that GitHub OIDC subject prefixes are normalied for repo: (#​310) (b9873a0)

v5.6.0

Compare Source

Features
  • Add support for creating IAM GitHub OIDC provider and role(s) (#​308) (cc44693)
5.5.7 (2022-11-09)
Bug Fixes
  • Add secretsmanager:ListSecrets to external-secrets policy (#​305) (d3fb017)
5.5.6 (2022-11-07)
Bug Fixes
  • Update CI configuration files to use latest version (#​302) (4c1c958)
5.5.5 (2022-11-01)
Bug Fixes
5.5.4 (2022-10-26)
Bug Fixes
  • Insufficient permissions for karpenter policy when not using karpenter discovery tags on security group (#​294) (5ad496b)
5.5.3 (2022-10-26)
Bug Fixes
  • Correct tflint errors for latest version of tflint (#​296) (b40ade4)
5.5.2 (2022-10-13)
Bug Fixes
  • Explicitly assume with condition matching role arn (#​283) (470b6ff)
5.5.1 (2022-10-12)
Bug Fixes

v5.5.7

Compare Source

v5.5.6

Compare Source

v5.5.5

Compare Source

v5.5.4

Compare Source

v5.5.3

Compare Source

v5.5.2

Compare Source

v5.5.1

Compare Source

v5.5.0

Compare Source

Features
  • Add support for roles created to explicitly assume their own role if desired (#​281) (3d29d26)

v5.4.0

Compare Source

Features
  • Add support for spot request permissions with Karpenter IRSA role (#​277) (b3b99d9)
5.3.3 (2022-09-06)
Bug Fixes
  • Fixed iam-user module when encrypted_ses_smtp_password_v4 is null (#​275) (936d0f1)
5.3.2 (2022-09-05)
Bug Fixes
5.3.1 (2022-08-25)
Bug Fixes
  • Don't force users to reset passwords in modules/iam-user (#​271) (358f7d4)

v5.3.3

Compare Source

v5.3.2

Compare Source

v5.3.1

Compare Source

v5.3.0

Compare Source

Features
  • Add additional permission for karpenter IAM policy added in v0.14.0 release (#​264) (bce17b2)

v5.2.0

Compare Source

Features
  • Add additional Karpenter permissions for spot pricing improvements (#​258) (14cc1df)

v5.1.0

Compare Source

Features
  • Update cluster autoscaler policy for recent permission changes upstream (#​255) (2f1b2bf)

v5.0.0

Compare Source

⚠ BREAKING CHANGES
  • Replace use of toset() for policy attachment, bump min version of AWS provider to 4.0 and Terraform to 1.0 (#​250)
Features
  • Replace use of toset() for policy attachment, bump min version of AWS provider to 4.0 and Terraform to 1.0 (#​250) (835135b)
4.24.1 (2022-05-10)
Bug Fixes
  • Avoid restricting Karpenter RunInstances subnets by tag key (#​247) (bbbe0c0)

v4.24.1

Compare Source

v4.24.0

Compare Source

Features

v4.23.0

Compare Source

Features
  • Improved iam-eks-role module (simplified, removed provider_url_sa_pairs, updated docs) (#​236) (d014730)
4.22.1 (2022-04-25)
Bug Fixes

v4.22.1

Compare Source

v4.22.0

Compare Source

Features
4.21.1 (2022-04-22)
Bug Fixes
  • Correct aws arn partition for service account eks (#​235) (e51b6c3)

v4.21.1

Compare Source

v4.21.0

Compare Source

Features
  • Added appmesh controller support to iam-role-for-service-accounts-eks (#​231) (0492955)
4.20.3 (2022-04-20)
Bug Fixes
  • Correct policy attachment to cert_manager in example (#​234) (6a28193)
4.20.2 (2022-04-19)
Bug Fixes
4.20.1 (2022-04-15)
Bug Fixes
  • Fixed example where VPC CNI permissions should apply to the aws-node account (#​225) (1fb1cfc)

v4.20.3

Compare Source

v4.20.2

Compare Source

v4.20.1

Compare Source

v4.20.0

Compare Source

Features
  • Add support for AMP, cert-manager, and external-secrets to iam-role-for-service-accounts-eks (#​223) (f53d409)

v4.19.0

Compare Source

Features
  • Add variable to allow changing tag condition on Karpenter iam-role-for-service-accounts-eks policy (#​218) (3d7ea33)

v4.18.0

Compare Source

Features
  • Add support for EFS CSI driver to iam-role-for-service-accounts-eks (#​215) (5afe63f)
4.17.2 (2022-03-31)
Bug Fixes
  • Fixed output of iam_user_login_profile_password in iam-user submodule (#​214) (932a7d8)
4.17.1 (2022-03-29)
Bug Fixes
  • Backwards compatibility in 4.x.x series in iam-user submodule (#​212) (2c57668)

v4.17.2

Compare Source

v4.17.1

Compare Source

v4.17.0

Compare Source

Features

v4.16.0

Compare Source

Features
  • Add load_balancer_controller targetgroup binding only role (#​199) (e00526e)
[4.15.1](https://redirect.github.com/terraform-aws-modules/terraform-aws-iam/compare/v4.15.0...v4

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch 3 times, most recently from 40165c6 to fe78181 Compare September 1, 2023 05:00
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch 2 times, most recently from d83b9ac to 345052c Compare November 11, 2023 11:13
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch 2 times, most recently from 0a0a014 to 97655ac Compare November 18, 2023 02:37
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch 4 times, most recently from fcdfd97 to de3c636 Compare November 22, 2023 16:20
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch 5 times, most recently from a3d120d to 89c612f Compare December 4, 2023 11:16
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch from 89c612f to 07435ad Compare December 22, 2023 10:10
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch from 07435ad to 55e4cae Compare February 26, 2024 16:37
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch from 55e4cae to 710141b Compare April 23, 2024 07:36
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch 2 times, most recently from abd1565 to 6e9b912 Compare May 2, 2024 08:59
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch from 6e9b912 to f91de61 Compare July 9, 2024 08:40
@renovate renovate bot force-pushed the renovate/terraform-aws-modules-iam-aws-5.x branch from f91de61 to 23e82b8 Compare September 10, 2024 13:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants