-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat!: Removed support for launch configuration and replace count
with for_each
#1680
feat!: Removed support for launch configuration and replace count
with for_each
#1680
Conversation
@bryantbiggs I think this feature should be moved to wubmodule |
Thank you for your contribution! The Remove any changes to the |
a24474b
to
c54c054
Compare
@daroga0002 / @antonbabenko this is getting close for review if you have time to check it out. I still need to populate the upgrade document and comprehensive list of changes, plus a few other design decisions (i.e. - using the default blocks, security group usage, etc.). I've made some more changes today to align variable usage and descriptions so I need to run through all of the examples yet again tomorrow to re-validate but 🤞🏽 they are working as intended (if not, please let me know). Let me know if you see any glaring/obvious errors - I'll be working on the upgrade doc and I would like to avoid having to make multiple iterations on it since I know its going to be quite involved. cc - @barryib / @max-rocket-internet / @dpiddock / @lisfo4ka for any input you may have as well 🙏🏽 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I did the first round of reviews and it looks very good. Minor comments here and there.
I think it is a good idea to have an SVG diagram describing bootstrap logic - https://raw.githubusercontent.com/bryantbiggs/terraform-aws-eks/refactor/breaking-changes/.github/images/user_data.svg |
0179050
to
e9d9476
Compare
yes, agreed! the images will be in the final PR but right now I have both a relative link and a fully qualified link. the relative link allows the image to be rendered in this PR just to make sure everything shows up as expected but it won't render on the remote Terraform docs for the module; this is what the fully qualified URL is for. so I was just putting a TODO reminder to remove the relative links before merging so that we have the fully qualified URLs that will show the images on both GitHub and on Terraform's module docs |
f6ac71b
to
885bb6e
Compare
ok this is finally ready for final review. I tried to work out some |
@bryantbiggs https://www.terraform.io/docs/language/modules/develop/refactoring.html this can be helpful for migration Terraform 1.1 introducing this 🎉 |
Are we raising minimum requirements from Terraform 0.13 to 1.1 already? :) It will be a surprise for many users, plus refactoring features released yesterday are not battle-tested yet. I think we can come back to this and start using something like this in half a year but not before. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
few questions:
- do we remove users/roles feature in aws-auth config? what will be desired way to make it?
- aws-auth seems be now required to be done outside module what is causing that in case of self nodes it will always require handling this externally (so module can be threated as not
sufficient
in terms of creating cluster - EKS silently create in background SG which is assigned by default to node groups, can we also assign this by default to self nodes so then we will have unified approach and will dont require adding those SGs for DNS and etc.
- what will happen with legacy module? should it be archived in seperate branch?
Beside some questions and concerns looks pretty well and solving a lot of issues 🎉
workaround is to precreate the iam roles |
count
with for_each
count
with for_each
bootstrap_extra_args = "-KubeletExtraArgs --node-labels=node.kubernetes.io/lifecycle=spot" | ||
|
||
post_bootstrap_user_data = <<-EOT | ||
[string]$Something = 'IStillDoNotKnowAnyPowerShell ¯\_(ツ)_/¯' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
version = ">= 2.0" | ||
} | ||
http = { | ||
source = "terraform-aws-modules/http" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you know if there is still a need for this http
provider we forked some time ago?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No I don't believe we need this anymore - but might be best to just archive it in case others are actually using it even if the EKS module is not
@bryantbiggs I am not sure why this PR didn't trigger a major release action, do you know? |
@bryantbiggs I renamed the PR title to include |
@antonbabenko it's probably because none of the commits (not the PR title) contains a |
PR title was "feat!: ...", so it was used as a commit ee9f0c6, too. |
oh yes, you're right |
well thats really annoying! let me see what I can find out @antonbabenko |
I've opened a PR to fix this here #1736 based on some testing I did today to dive into this issue. tl;dr - default of |
## [18.0.0](v17.24.0...v18.0.0) (2022-01-05) ### ⚠ BREAKING CHANGES * Removed support for launch configuration and replace `count` with `for_each` (#1680) ### Features * Removed support for launch configuration and replace `count` with `for_each` ([#1680](#1680)) ([ee9f0c6](ee9f0c6)) ### Bug Fixes * Update preset rule on semantic-release to use conventional commits ([#1736](#1736)) ([be86c0b](be86c0b))
This PR is included in version 18.0.0 🎉 |
I am trying to find out why |
its not missing, it was removed. The documentation provided is related to how the module is designed, how to configure the module, etc. If you wish to discover what permissions are required for your configuration, you can use IAM access analyzer, https://github.com/iann0036/iamlive, or other similar tools |
## [18.0.0](terraform-aws-modules/terraform-aws-eks@v17.24.0...v18.0.0) (2022-01-05) ### ⚠ BREAKING CHANGES * Removed support for launch configuration and replace `count` with `for_each` (#1680) ### Features * Removed support for launch configuration and replace `count` with `for_each` ([#1680](terraform-aws-modules/terraform-aws-eks#1680)) ([17031bd](terraform-aws-modules/terraform-aws-eks@17031bd)) ### Bug Fixes * Update preset rule on semantic-release to use conventional commits ([#1736](terraform-aws-modules/terraform-aws-eks#1736)) ([e26a7d9](terraform-aws-modules/terraform-aws-eks@e26a7d9))
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Motivation and Context
aws_launch_configuration
#1679Breaking Changes
How Has This Been Tested?
examples/*
projectsexamples/
have been updated and validated