-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
feat!: Upgrade AWS provider and min required Terraform version to 6.0 and 1.5.7 respectively
#585
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat!: Upgrade AWS provider and min required Terraform version to 6.0 and 1.5.7 respectively
#585
Conversation
antonbabenko
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lots of awesome stuff! :)
## [6.0.0](v5.60.0...v6.0.0) (2025-08-13) ### ⚠ BREAKING CHANGES * Upgrade AWS provider and min required Terraform version to `6.0` and `1.5.7` respectively (#585) ### Features * Upgrade AWS provider and min required Terraform version to `6.0` and `1.5.7` respectively ([#585](#585)) ([31b31d7](31b31d7))
|
This PR is included in version 6.0.0 🎉 |
|
After hanging up a CI and finding the module to find 404, I stumbled here and found it. |
Is there any fallback link to preserve the old v5.x.x version of Terraform AWS? |
List of backwards incompatible changes
See the
docs/UPGRADE-6.0.mdguide for more detailsTerraform
v1.5.7is now minimum supported versionAWS provider
v6.0.0is now minimum supported versionThe ability to allow roles to assume their own roles has been removed. This was previously added as part of helping users mitigate https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/. Going forward, users will need to mitigate this on the application side (i.e. - do not have a role assume itself), or update the trust policy in their implementation to continue using this behavior. It is strongly recommended to mitigate this by not having the role assume itself.
iam-account:aws_caller_identitydata source and associated outputs have been removed. Users should instead use the data source directly in their configurationiam-assumable-rolehas been renamed toiam-roleiam-assumable-role-with-oidchas been merged intoiam-roleiam-assumable-role-with-samlhas been merged intoiam-roleiam-assumable-roleshas been removed;iam-roleshould be used insteadiam-assumable-roles-with-samlhas been removed;iam-roleshould be used insteadiam-github-oidc-providerhas been renamed toiam-oidc-provideriam-github-oidc-rolehas been merged intoiam-roleiam-group-with-policieshas been renamed toiam-groupiam-group-with-assumable-roles-policyhas been merged intoiam-groupiam-eks-rolehas been removed;iam-role-for-service-accountsoreks-pod-identityshould be used insteadiam-policyhas been removed; theaws_iam_policyresource should be used directly insteadiam-role-for-service-accounts-ekshas been renamed toiam-role-for-service-accountsstateDiagram direction LR # Old assumeRole: iam-assumable-role assumeRoleOIDC: iam-assumable-role-with-oidc assumeRoleSAML: iam-assumable-role-with-saml assumeRoles: iam-assumable-roles assumeRolesSAML: iam-assumable-roles-with-saml githubOIDCProvider: iam-github-oidc-provider githubOIDCRole: iam-github-oidc-role groupWithAssumablePolicy: iam-group-with-assumable-roles-policy groupWithPolicies: iam-group-with-policies # New group: iam-group oidcProvider: iam-oidc-provider role: iam-role assumeRole --> role assumeRoleOIDC --> role assumeRoleSAML --> role assumeRoles --> role assumeRolesSAML --> role githubOIDCRole --> role groupWithAssumablePolicy --> group groupWithPolicies --> group githubOIDCProvider --> oidcProviderAdditional changes
Modified
Variable definitions now contain detailed
objecttypes in place of the previously used any typeiam-grouppermissionstrueinstead offalseiam-roletrust_policy_permissionsvariable. This allows for any number of custom statements to be added to the role's trust policy.custom_role_policy_arnshas been renamed topoliciesand now accepts a map ofname:policy-arnpairs; this allows for both existing policies and policies that will get created at the same time as the role. This also replaces the admin, readonly, and poweruser policy ARN variables and their associatedattach_*_policyvariables.trueinstead offalseforce_detach_policieshas been removed; this is now alwaystrueiam-role-for-service-accountsMotivation and Context
Breaking Changes
How Has This Been Tested?
examples/*to demonstrate and validate my change(s)examples/*projectspre-commit run -aon my pull request