Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: terraform-aws-modules/terraform-aws-eks
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v20.33.1
Choose a base ref
...
head repository: terraform-aws-modules/terraform-aws-eks
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v20.34.0
Choose a head ref
  • 3 commits
  • 4 files changed
  • 3 contributors

Commits on Feb 19, 2025

  1. docs: Update description of karpenter node_iam_role_use_name_prefix (

    ebachle authored Feb 19, 2025
    Copy the full SHA
    1bfc10a View commit details

Commits on Mar 7, 2025

  1. feat: Add capacity reservation permissions to Karpenter IAM policy (#…

    …3318)
    
    feat: Update AllowScopedEC2InstanceAccessActions policy to include capacity-reservation permission as part of Karpenter version 1.3.0
    mattholmes15 authored Mar 7, 2025
    Copy the full SHA
    770ee99 View commit details
  2. chore(release): version 20.34.0 [skip ci]

    ## [20.34.0](v20.33.1...v20.34.0) (2025-03-07)
    
    ### Features
    
    * Add capacity reservation permissions to Karpenter IAM policy ([#3318](#3318)) ([770ee99](770ee99))
    semantic-release-bot committed Mar 7, 2025
    Copy the full SHA
    dd2089b View commit details
Showing with 10 additions and 2 deletions.
  1. +7 −0 CHANGELOG.md
  2. +1 −1 modules/karpenter/README.md
  3. +1 −0 modules/karpenter/policy.tf
  4. +1 −1 modules/karpenter/variables.tf
7 changes: 7 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -2,6 +2,13 @@

All notable changes to this project will be documented in this file.

## [20.34.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v20.33.1...v20.34.0) (2025-03-07)


### Features

* Add capacity reservation permissions to Karpenter IAM policy ([#3318](https://github.com/terraform-aws-modules/terraform-aws-eks/issues/3318)) ([770ee99](https://github.com/terraform-aws-modules/terraform-aws-eks/commit/770ee99d9c4b61c509d9988eac62de4db113af91))

## [20.33.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v20.33.0...v20.33.1) (2025-01-22)


2 changes: 1 addition & 1 deletion modules/karpenter/README.md
Original file line number Diff line number Diff line change
@@ -170,7 +170,7 @@ No modules.
| <a name="input_node_iam_role_path"></a> [node\_iam\_role\_path](#input\_node\_iam\_role\_path) | IAM role path | `string` | `"/"` | no |
| <a name="input_node_iam_role_permissions_boundary"></a> [node\_iam\_role\_permissions\_boundary](#input\_node\_iam\_role\_permissions\_boundary) | ARN of the policy that is used to set the permissions boundary for the IAM role | `string` | `null` | no |
| <a name="input_node_iam_role_tags"></a> [node\_iam\_role\_tags](#input\_node\_iam\_role\_tags) | A map of additional tags to add to the IAM role created | `map(string)` | `{}` | no |
| <a name="input_node_iam_role_use_name_prefix"></a> [node\_iam\_role\_use\_name\_prefix](#input\_node\_iam\_role\_use\_name\_prefix) | Determines whether the IAM role name (`iam_role_name`) is used as a prefix | `bool` | `true` | no |
| <a name="input_node_iam_role_use_name_prefix"></a> [node\_iam\_role\_use\_name\_prefix](#input\_node\_iam\_role\_use\_name\_prefix) | Determines whether the Node IAM role name (`node_iam_role_name`) is used as a prefix | `bool` | `true` | no |
| <a name="input_queue_kms_data_key_reuse_period_seconds"></a> [queue\_kms\_data\_key\_reuse\_period\_seconds](#input\_queue\_kms\_data\_key\_reuse\_period\_seconds) | The length of time, in seconds, for which Amazon SQS can reuse a data key to encrypt or decrypt messages before calling AWS KMS again | `number` | `null` | no |
| <a name="input_queue_kms_master_key_id"></a> [queue\_kms\_master\_key\_id](#input\_queue\_kms\_master\_key\_id) | The ID of an AWS-managed customer master key (CMK) for Amazon SQS or a custom CMK | `string` | `null` | no |
| <a name="input_queue_managed_sse_enabled"></a> [queue\_managed\_sse\_enabled](#input\_queue\_managed\_sse\_enabled) | Boolean to enable server-side encryption (SSE) of message content with SQS-owned encryption keys | `bool` | `true` | no |
1 change: 1 addition & 0 deletions modules/karpenter/policy.tf
Original file line number Diff line number Diff line change
@@ -361,6 +361,7 @@ data "aws_iam_policy_document" "v1" {
"arn:${local.partition}:ec2:${local.region}::snapshot/*",
"arn:${local.partition}:ec2:${local.region}:*:security-group/*",
"arn:${local.partition}:ec2:${local.region}:*:subnet/*",
"arn:${local.partition}:ec2:${local.region}:*:capacity-reservation/*",
]

actions = [
2 changes: 1 addition & 1 deletion modules/karpenter/variables.tf
Original file line number Diff line number Diff line change
@@ -236,7 +236,7 @@ variable "node_iam_role_name" {
}

variable "node_iam_role_use_name_prefix" {
description = "Determines whether the IAM role name (`iam_role_name`) is used as a prefix"
description = "Determines whether the Node IAM role name (`node_iam_role_name`) is used as a prefix"
type = bool
default = true
}