-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Wrong rolearn in aws_auth_configmap_yaml #1820
fix: Wrong rolearn in aws_auth_configmap_yaml #1820
Conversation
2766fd7
to
d2696d2
Compare
d2696d2
to
1baa6de
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks for catching this @Anorlondo448 - verified that this change is the correct output this morning. please run pre-commit run -a
on your PR so the docs are updated, etc.
should be good to go with the above @antonbabenko 👍🏽
### [18.2.6](v18.2.5...v18.2.6) (2022-02-01) ### Bug Fixes * Wrong rolearn in aws_auth_configmap_yaml ([#1820](#1820)) ([776009d](776009d))
This PR is included in version 18.2.6 🎉 |
### [18.2.6](terraform-aws-modules/terraform-aws-eks@v18.2.5...v18.2.6) (2022-02-01) ### Bug Fixes * Wrong rolearn in aws_auth_configmap_yaml ([#1820](terraform-aws-modules/terraform-aws-eks#1820)) ([1d3620e](terraform-aws-modules/terraform-aws-eks@1d3620e))
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Change the rolearn set in aws_auth_configmap_yaml to the correct one.
Currently, the “Fargate Profile ARN” is set instead of the “Pod Execution Role ARN”, so the correct IAM policy cannot be retrieved.
Motivation and Context
Breaking Changes
Yes.
Because currently, “Fargate Profile ARN” is set in rolearn instead of “Pod Execution Role ARN”, so the correct IAM policy is It cannot be retrieved.
How Has This Been Tested?
Output aws_auth_configmap_yaml and confirmed that “Pod Execution Role ARN” is set in rolearn.