Skip to content

v1.0.0 Disruptive change

Compare
Choose a tag to compare
@cloudpossebot cloudpossebot released this 22 Apr 19:49
3e16d58

This is the first release with production Semantic Versioning, part of Cloud Posse's general policy to convert to production versioning as we make updates to relatively mature modules.

It contains a disruptive change. See #27 for details, but the short story is that applying this update will likely cause Terraform to delete and re-create the EKS IAM role. This may cause a transient disruption in service, but it should be within the normal tolerance for delays in recovering from an expired session.

More significantly, if you have attached additional policies to the role created by this module, those policies will need to be re-attached to the re-created role. (We expect that very few people are actually doing this.)

Refactor enable logic to use counts instead of `for_each` @elventear (#27)

what

Use count instead of for_each to manage if a resource is enabled or disabled.

why

If any element of the service account name is not known at plan time, for_each would cause the plan to fail.

The main advantage of for_each over count is stability when an item in a list is added or removed or the order of elements in a list changes. With for_each, only the changed item is affected, while with count other items can be affected by being moved to a different position in the list. This advantage is not applicable to this module because there is always only one item.

note

This change will cause the IAM role to be deleted and recreated. If you have attached policies to the role outside of this module, you will need to reattach them.