-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: public_access_cidrs
require a value even if public endpoint is disabled
#2320
fix: public_access_cidrs
require a value even if public endpoint is disabled
#2320
Conversation
Just hit this as well, can verify that setting |
interesting - it looks like our previous default value is causing the issue here. the value is optional and does not have a default https://github.com/hashicorp/terraform-provider-aws/blob/a421ee175fdae8d1d2d5ef71b86d46809b4780fb/internal/service/eks/cluster.go#L257 but I'm guessing that because in prior versions the default value was set to |
@@ -27,7 +27,7 @@ resource "aws_eks_cluster" "this" { | |||
subnet_ids = coalescelist(var.control_plane_subnet_ids, var.subnet_ids) | |||
endpoint_private_access = var.cluster_endpoint_private_access | |||
endpoint_public_access = var.cluster_endpoint_public_access | |||
public_access_cidrs = var.cluster_endpoint_public_access ? var.cluster_endpoint_public_access_cidrs : [] | |||
public_access_cidrs = var.cluster_endpoint_public_access_cidrs |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it looks like our default value of ["0.0.0.0/0"]
is the correct default and we can't set to an empty array so reverting to the previous setup
public_access_cidrs
require a value even if public endpoint is disabled
### [19.0.2](v19.0.1...v19.0.2) (2022-12-06) ### Bug Fixes * `public_access_cidrs` require a value even if public endpoint is disabled ([#2320](#2320)) ([3f6d915](3f6d915))
This PR is included in version 19.0.2 🎉 |
… disabled (terraform-aws-modules#2320) Co-authored-by: Bryant Biggs <bryantbiggs@gmail.com>
### [19.0.2](terraform-aws-modules/terraform-aws-eks@v19.0.1...v19.0.2) (2022-12-06) ### Bug Fixes * `public_access_cidrs` require a value even if public endpoint is disabled ([terraform-aws-modules#2320](terraform-aws-modules#2320)) ([3f6d915](terraform-aws-modules@3f6d915))
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Do not set public_access_cidr when public access is disabled.
Motivation and Context
When upgrading from v18 -> v19 with an existing private-only cluster we were shown the following plan:
When applying we got:
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request