Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: terraform-aws-modules/terraform-aws-eks
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v20.33.0
Choose a base ref
...
head repository: terraform-aws-modules/terraform-aws-eks
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: master
Choose a head ref
  • 10 commits
  • 38 files changed
  • 7 contributors

Commits on Jan 22, 2025

  1. fix: Allow "EC2" access entry type for EKS Auto Mode custom node po…

    …ols (#3281)
    
    Removed EC2 type from condition so policy attachement for access entry can be done for EC2 type for creating access entry for Node role.
    
    While Creating Access entry for Self managed node role, we were getting below error as it seems EC2 type is included in exception for policy attachment. Once I removed EC2 from exception condition, it started picking up Policy attachment and Access Entry got created.
    
    │ Error: Unsupported attribute
    │ 
    │   on .terraform/modules/eks/main.tf line 289, in resource "aws_eks_access_policy_association" "this":
    │  289:   policy_arn    = each.value.association_policy_arn
    │     ├────────────────
    │     │ each.value is object with 3 attributes
    │ 
    │ This object does not have an attribute named "association_policy_arn".
    vibhamsharma authored Jan 22, 2025
    Configuration menu
    Copy the full SHA
    3e2ea83 View commit details
    Browse the repository at this point in the history
  2. chore(release): version 20.33.1 [skip ci]

    ## [20.33.1](v20.33.0...v20.33.1) (2025-01-22)
    
    ### Bug Fixes
    
    * Allow `"EC2"` access entry type for EKS Auto Mode custom node pools ([#3281](#3281)) ([3e2ea83](3e2ea83))
    semantic-release-bot committed Jan 22, 2025
    Configuration menu
    Copy the full SHA
    50cb230 View commit details
    Browse the repository at this point in the history

Commits on Feb 19, 2025

  1. Configuration menu
    Copy the full SHA
    1bfc10a View commit details
    Browse the repository at this point in the history

Commits on Mar 7, 2025

  1. feat: Add capacity reservation permissions to Karpenter IAM policy (#…

    …3318)
    
    feat: Update AllowScopedEC2InstanceAccessActions policy to include capacity-reservation permission as part of Karpenter version 1.3.0
    mattholmes15 authored Mar 7, 2025
    Configuration menu
    Copy the full SHA
    770ee99 View commit details
    Browse the repository at this point in the history
  2. chore(release): version 20.34.0 [skip ci]

    ## [20.34.0](v20.33.1...v20.34.0) (2025-03-07)
    
    ### Features
    
    * Add capacity reservation permissions to Karpenter IAM policy ([#3318](#3318)) ([770ee99](770ee99))
    semantic-release-bot committed Mar 7, 2025
    Configuration menu
    Copy the full SHA
    dd2089b View commit details
    Browse the repository at this point in the history

Commits on Mar 29, 2025

  1. feat: Default to not changing autoscaling schedule values at the sche…

    …duled time (#3322)
    
    fix: aws_autoscaling_schedule values defaulting to 0
    tomellis91 authored Mar 29, 2025
    Configuration menu
    Copy the full SHA
    abf76f6 View commit details
    Browse the repository at this point in the history
  2. chore(release): version 20.35.0 [skip ci]

    ## [20.35.0](v20.34.0...v20.35.0) (2025-03-29)
    
    ### Features
    
    * Default to not changing autoscaling schedule values at the scheduled time ([#3322](#3322)) ([abf76f6](abf76f6))
    semantic-release-bot committed Mar 29, 2025
    Configuration menu
    Copy the full SHA
    0b9d27b View commit details
    Browse the repository at this point in the history

Commits on Apr 11, 2025

  1. docs: Set ami_type for AL2023 in the example (#3337)

    set ami_type for AL2023
    
    Set AMI type explicitly   into user data type to be able to use cloudinit_pre_nodeadm 
    
    https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/modules/_user_data/main.tf#L33
    ismailyenigul authored Apr 11, 2025
    Configuration menu
    Copy the full SHA
    5c8ac85 View commit details
    Browse the repository at this point in the history

Commits on Apr 18, 2025

  1. Configuration menu
    Copy the full SHA
    207d73f View commit details
    Browse the repository at this point in the history
  2. chore(release): version 20.36.0 [skip ci]

    ## [20.36.0](v20.35.0...v20.36.0) (2025-04-18)
    
    ### Features
    
    * Add support for cluster `force_update_version` ([#3345](#3345)) ([207d73f](207d73f))
    semantic-release-bot committed Apr 18, 2025
    Configuration menu
    Copy the full SHA
    37e3348 View commit details
    Browse the repository at this point in the history
Loading