diff --git a/.chglog/CHANGELOG.tpl.md b/.chglog/CHANGELOG.tpl.md
new file mode 100644
index 0000000000..52d22241c0
--- /dev/null
+++ b/.chglog/CHANGELOG.tpl.md
@@ -0,0 +1,66 @@
+# Change Log
+
+All notable changes to this project will be documented in this file.
+
+The format is based on [Keep a Changelog](http://keepachangelog.com/) and this
+project adheres to [Semantic Versioning](http://semver.org/).
+
+{{ if .Versions -}}
+
+## [Unreleased]
+{{ if .Unreleased.CommitGroups -}}
+{{ range .Unreleased.CommitGroups -}}
+{{ .Title }}:
+{{ range .Commits -}}
+{{- if .Subject -}}
+- {{ if .Scope }}**{{ .Scope }}:** {{ end }}{{ .Subject }}
+{{- end -}}
+{{ end }}
+{{ end -}}
+{{ else }}
+{{ range .Unreleased.Commits -}}
+{{- if .Subject -}}
+- {{ if .Scope }}**{{ .Scope }}:** {{ end }}{{ .Subject }}
+{{- end -}}
+{{ end }}
+{{ end -}}
+{{ end -}}
+
+{{ range .Versions }}
+
+## {{ if .Tag.Previous }}[{{ .Tag.Name }}]{{ else }}{{ .Tag.Name }}{{ end }} - {{ datetime "2006-01-02" .Tag.Date }}
+{{ if .CommitGroups -}}
+{{ range .CommitGroups -}}
+{{ .Title }}:
+{{ range .Commits -}}
+{{- if .Subject -}}
+- {{ if .Scope }}**{{ .Scope }}:** {{ end }}{{ .Subject }}
+{{- end -}}
+{{ end }}
+{{ end -}}
+{{ else }}
+{{ range .Commits -}}
+{{- if .Subject -}}
+- {{ if .Scope }}**{{ .Scope }}:** {{ end }}{{ .Subject }}
+{{- end -}}
+{{ end }}
+{{ end -}}
+
+{{- if .NoteGroups -}}
+{{ range .NoteGroups -}}
+{{ .Title }}:
+{{ range .Notes }}
+{{ .Body }}
+{{ end }}
+{{ end -}}
+{{ end -}}
+{{ end -}}
+
+{{- if .Versions }}
+[Unreleased]: {{ .Info.RepositoryURL }}/compare/{{ $latest := index .Versions 0 }}{{ $latest.Tag.Name }}...HEAD
+{{ range .Versions -}}
+{{ if .Tag.Previous -}}
+[{{ .Tag.Name }}]: {{ $.Info.RepositoryURL }}/compare/{{ .Tag.Previous.Name }}...{{ .Tag.Name }}
+{{ end -}}
+{{ end -}}
+{{ end -}}
diff --git a/.chglog/config.yml b/.chglog/config.yml
new file mode 100644
index 0000000000..e9fff99ed6
--- /dev/null
+++ b/.chglog/config.yml
@@ -0,0 +1,48 @@
+style: github
+template: CHANGELOG.tpl.md
+info:
+ title: CHANGELOG
+ repository_url: https://github.com/terraform-aws-modules/terraform-aws-eks
+options:
+
+ commits:
+ sort_by: Type
+ filters:
+ Type:
+ - feat
+ - fix
+ - improvement
+ - docs
+ - refactor
+ - test
+ - ci
+ - chore
+
+ commit_groups:
+ group_by: Type
+ title_maps:
+ feat: FEATURES
+ fix: BUG FIXES
+ improvement: ENHANCEMENTS
+ docs: DOCS
+ refactor: REFACTORS
+ test: TESTS
+ ci: CI
+ chore: CHORES
+
+ header:
+ pattern: "^(\\.+)\\s*:\\s*(.+)$"
+ pattern_maps:
+ - Type
+ - Subject
+
+ notes:
+ keywords:
+ - BREAKING CHANGE
+ - NOTES
+
+ refs:
+ actions:
+ - Closes
+ - Fixes
+ - Resolves
diff --git a/.github/CONTRIBUTING.md b/.github/CONTRIBUTING.md
new file mode 100644
index 0000000000..0323f79ab1
--- /dev/null
+++ b/.github/CONTRIBUTING.md
@@ -0,0 +1,34 @@
+# Contributing
+
+When contributing to this repository, please first discuss the change you wish to make via issue,
+email, or any other method with the owners of this repository before making a change.
+
+Please note we have a code of conduct, please follow it in all your interactions with the project.
+
+## Pull Request Process
+
+1. Ensure any install or build dependencies are removed before the end of the layer when doing a build.
+2. Update the README.md with details of changes to the interface, this includes new environment variables, exposed ports, useful file locations and container parameters.
+3. Once all outstanding comments and checklist items have been addressed, your contribution will be merged! Merged PRs will be included in the next release. The terraform-aws-eks mainteners takes care of updating the CHANGELOG as they merge.
+
+## Checklists for contributions
+
+- [ ] Add [sementics prefix](#semantic-pull-requests) to your PR or Commits (at leats one of your commit groups)
+- [ ] CI tests are passing
+- [ ] README.md has been updated after any changes to variables and outputs. See https://github.com/terraform-aws-modules/terraform-aws-eks/#doc-generation
+
+## Semantic Pull Requests
+
+To generate changelog, Pull Requests or Commits must have sementic and must follow conventional specs below:
+
+- `feat:` for new features
+- `fix:` for bug fixes
+- `improvement:` for enhancements
+- `docs:` for documentation and examples
+- `refactor:` for code refactoring
+- `test:` for tests
+- `ci:` for CI purpose
+- `chore:` for chores stuff
+
+There is a special prefix `skip changelog` which is skipped during changelog generation. It can be used for `skip changelog: update changelog` commit message by example.
+
diff --git a/.github/PULL_REQUEST_TEMPLATE.md b/.github/PULL_REQUEST_TEMPLATE.md
index 9310a74454..6a10d8fa5f 100644
--- a/.github/PULL_REQUEST_TEMPLATE.md
+++ b/.github/PULL_REQUEST_TEMPLATE.md
@@ -6,6 +6,5 @@ Please explain the changes you made here and link to any relevant issues.
### Checklist
-- [ ] Change added to CHANGELOG.md. All changes must be added and breaking changes and highlighted
- [ ] CI tests are passing
- [ ] README.md has been updated after any changes to variables and outputs. See https://github.com/terraform-aws-modules/terraform-aws-eks/#doc-generation
diff --git a/.github/semantic.yml b/.github/semantic.yml
new file mode 100644
index 0000000000..e0c83c7166
--- /dev/null
+++ b/.github/semantic.yml
@@ -0,0 +1,14 @@
+# By default types specified in commitizen/conventional-commit-types is used.
+# See: https://github.com/commitizen/conventional-commit-types/blob/v2.3.0/index.json
+# You can override the valid types
+types:
+ - feat
+ - fix
+ - improvement
+ - docs
+ - refactor
+ - test
+ - ci
+ - chore
+ - skip changelog
+ - skip ci
diff --git a/.github/workflows/changelog-check.yaml b/.github/workflows/changelog-check.yaml
new file mode 100644
index 0000000000..34fe6056c3
--- /dev/null
+++ b/.github/workflows/changelog-check.yaml
@@ -0,0 +1,20 @@
+name: CHANGELOG Checks
+on:
+ pull_request:
+ paths:
+ - CHANGELOG.md
+
+jobs:
+ changelog-check:
+ name: CHANGELOG Check
+ runs-on: ubuntu-latest
+ steps:
+ - name: Fail the check if changelog change
+ run: |-
+ echo "Thank you for your contribution!"
+ echo ""
+ echo "The 'CHANGELOG.md' file contents are handled by the maintainers during merge. This is to prevent pull request merge conflicts."
+ echo "Please see the Contributing Guide for additional pull request review items."
+ echo ""
+ echo "Remove any changes to the 'CHANGELOG.md' file and commit them in this pull request."
+ exit 1
diff --git a/CHANGELOG.md b/CHANGELOG.pre-v11.0.0.md
similarity index 85%
rename from CHANGELOG.md
rename to CHANGELOG.pre-v11.0.0.md
index 343031df6c..4d49358a52 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.pre-v11.0.0.md
@@ -5,15 +5,7 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](http://keepachangelog.com/) and this
project adheres to [Semantic Versioning](http://semver.org/).
-## Next release
-
-## [[v10.?.?](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v10.0.0...HEAD)] - 2020-xx-xx
-
-- Write your awesome change here (GH-xxxx)
-
-## History
-
-## [[v10.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v9.0.0...v10.0.0)] - 2020-03-12
+## [v10.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v9.0.0...v10.0.0) - 2020-03-12
BREAKING CHANGES:
@@ -39,7 +31,7 @@ NOTES:
From EKS 1.15, the VPC tag `kubernetes.io/cluster/: shared` is no longer required. So we droped those tags from exemples.
-## [[v9.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v8.2.0...v9.0.0)] - 2020-02-27
+## [v9.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v8.2.0...v9.0.0) - 2020-02-27
- **Breaking:** Removal of autoscaling IAM policy and tags (by @max-rocket-internet)
- Revert #631. Add back manage security group flags. (by @ryanooi)
@@ -57,19 +49,19 @@ From EKS 1.15, the VPC tag `kubernetes.io/cluster/: shared` is no
Autoscaling policy and tags have been removed from this module. This reduces complexity and increases security as the policy was attached to the node group IAM role. To manage it outside of this module either follow the example in `examples/irsa` to attach an IAM role to the cluster-autoscaler `serviceAccount` or create [the policy](https://github.com/terraform-aws-modules/terraform-aws-eks/blob/v8.2.0/workers.tf#L361-L416) outside this module and pass it in using the `workers_additional_policies` variable.
-## [[v8.2.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v8.1.0...v8.2.0)] - 2020-01-29
+## [v8.2.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v8.1.0...v8.2.0) - 2020-01-29
- Include ability to configure custom os-specific command for waiting until kube cluster is healthy (@sanjeevgiri)
- Disable creation of ingress rules if worker nodes security groups are exists (@andjelx)
- [CI] Update pre-commit and re-generate docs to work with terraform-docs >= 0.8.1 (@barryib)
-## [[v8.1.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v8.0.0...v8.1.0)] - 2020-01-17
+## [v8.1.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v8.0.0...v8.1.0) - 2020-01-17
- Fix index reference on destroy for output `oidc_provider_arn` (@stevie-)
- Add support for restricting access to the public API endpoint (@sidprak)
- Add an `ignore_lifecycle` rule to prevent Terraform from scaling down ASG behind AWS EKS Managed Node Group (by @davidalger)
-## [[v8.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v8.0.0...v7.0.1)] - 2020-01-09
+## [v8.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v8.0.0...v7.0.1) - 2020-01-09
- **Breaking:** Change logic of security group whitelisting. Will always whitelist worker security group on control plane security group either provide one or create new one. See Important notes below for upgrade notes (by @ryanooi)
- **Breaking:** Configure the aws-auth configmap using the terraform kubernetes providers. See Important notes below for upgrade notes (by @sdehaes)
@@ -110,14 +102,14 @@ For security group whitelisting change. After upgrade, have to remove `cluster_c
terraform import module.eks.aws_security_group_rule.cluster_https_worker_ingress _ingress_tcp_443_443_
```
-## [[v7.0.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v7.0.1...v7.0.0)] - 2019-12-11
+## [v7.0.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v7.0.1...v7.0.0) - 2019-12-11
- Test against minimum versions specified in `versions.tf` (by @dpiddockcmp)
- Updated `instance_profile_names` and `instance_profile_arns` outputs to also consider launch template as well as asg (by @ankitwal)
- Fix broken terraform plan/apply on a cluster < 1.14 (by @hodduc)
- Updated application of `aws-auth` configmap to create `kube_config.yaml` and `aws_auth_configmap.yaml` in sequence (and not parallel) to `kubectl apply` (by @knittingdev)
-## [[v7.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v6.0.2...v7.0.0)] - 2019-10-30
+## [v7.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v6.0.2...v7.0.0) - 2019-10-30
- **Breaking:** Allow for specifying a custom AMI for the worker nodes. (by @bmcstdio)
- Added support for Windows workers AMIs (by @hodduc)
@@ -131,20 +123,20 @@ terraform import module.eks.aws_security_group_rule.cluster_https_worker_ingress
An AMI is now specified using the whole name, for example `amazon-eks-node-1.14-v20190927`.
-## [[v6.0.2](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v6.0.1...v6.0.2)] - 2019-10-07
+## [v6.0.2](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v6.0.1...v6.0.2) - 2019-10-07
- Added `tags` to `aws_eks_cluster` introduced by terraform-provider-aws 2.31.0 (by @morganchristiansson)
- Add option to enable lifecycle hooks creation (by @barryib)
- Remove helm chart value `sslCertPath` described in `docs/autoscaling.md` (by @wi1dcard)
- Attaching of IAM policies for autoscaler and CNI to the worker nodes now optional (by @dpiddockcmp)
-## [[v6.0.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v6.0.0...v6.0.1)] - 2019-09-25
+## [v6.0.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v6.0.0...v6.0.1) - 2019-09-25
- Added support for different workers AMI's, i.e. with GPU support (by @rvoitenko)
- Use null as default value for `target_group_arns` attribute of worker autoscaling group (by @tatusl)
- Output empty string when cluster identity is empty (by @tbarry)
-## [[v6.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v5.1.0...v6.0.0)] - 2019-09-17
+## [v6.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v5.1.0...v6.0.0) - 2019-09-17
- Added `market_type` to `workers_launch_template.tf` allow the usage of spot nodegroups without mixed instances policy.
- Added support for log group tag in `./cluster.tf` (@lucas-giaco)
@@ -172,11 +164,11 @@ You will need to move worker groups from `worker_groups_launch_template_mixed` t
Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [""]`.
-## [[v5.1.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v5.1.0...v5.1.1)] - 2019-07-30
+## [v5.1.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v5.1.0...v5.1.1) - 2019-07-30
- Added new tag in `worker.tf` with autoscaling_enabled = true flag (by @insider89)
-## [[v5.1.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v5.0.0...v5.1.0)] - 2019-07-30
+## [v5.1.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v5.0.0...v5.1.0) - 2019-07-30
- Option to set a KMS key for the log group and encrypt it (by @till-krauss)
- Output the name of the cloudwatch log group (by @gbooth27)
@@ -186,7 +178,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Update default override instance types to work with Cluster Autoscaler (by @nauxliu on behalf of RightCapital)
- Examples now specify `enable_dns_hostnames = true`, as per [EKS documentation](https://docs.aws.amazon.com/eks/latest/userguide/network_reqs.html) (by @karolinepauls)
-## [[v5.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v4.0.2...v5.0.0)] - 2019-06-19
+## [v5.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v4.0.2...v5.0.0) - 2019-06-19
- Added Termination Policy Option to worker ASGs (by @undeadops)
- Update EBS optimized instances type (by @gloutsch)
@@ -200,17 +192,17 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Change override instance_types to list (by @nauxliu on behalf of RightCapital)
- Fix toggle for IAM instance profile creation for mixed launch templates (by @jnozo)
-## [[v4.0.2](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v4.0.1...v4.0.2)] - 2019-05-07
+## [v4.0.2](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v4.0.1...v4.0.2) - 2019-05-07
- Added 2 new examples, also tidy up basic example (by @max-rocket-internet)
- Updates to travis, PR template (by @max-rocket-internet)
- Fix typo in data.tf (by @max-rocket-internet)
- Add missing launch template items in `aws_auth.tf` (by @max-rocket-internet)
-## [[v4.0.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v4.0.0...v4.0.1)] - 2019-05-07
+## [v4.0.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v4.0.0...v4.0.1) - 2019-05-07
- Fix annoying typo: worker_group_xx vs worker_groups_xx (by @max-rocket-internet)
-## [[v4.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v3.0.0...v4.0.0)] - 2019-05-07
+## [v4.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v3.0.0...v4.0.0) - 2019-05-07
- Added support for custom service linked role for Auto Scaling group (by @voanhduy1512)
- Added support for custom IAM roles for cluster and workers (by @erks)
@@ -225,7 +217,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Switch to https for the pre-commit repos (by @rothandrew)
- Add instructions on how to enable the docker bridge network (by @rothandrew)
-## [[v3.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.3.1...v3.0.0)] - 2019-04-15
+## [v3.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.3.1...v3.0.0) - 2019-04-15
- Fixed: Ability to destroy clusters due to security groups being attached to ENI's (by @whiskeyjimbo)
- Added outputs for worker IAM instance profile(s) (by @soapergem)
@@ -233,13 +225,13 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Updated vpc module version and aws provider version. (by @chenrui333)
- Upgraded default kubernetes version from 1.11 to 1.12 (by @stijndehaes)
-## [[v2.3.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.3.0...v2.3.1)] - 2019-03-26
+## [v2.3.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.3.0...v2.3.1) - 2019-03-26
- Added support for eks public and private endpoints (by @stijndehaes)
- Added minimum inbound traffic rule to the cluster worker security group as per the [EKS security group requirements](https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html) (by @sc250024)
- (Breaking Change) Replaced `enable_docker_bridge` with a generic option called `bootstrap_extra_args` to resolve [310](https://github.com/terraform-aws-modules/terraform-aws-eks/issues/310) (by @max-rocket-internet)
-## [[v2.3.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.2.1...v2.3.0)] - 2019-03-20
+## [v2.3.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.2.1...v2.3.0) - 2019-03-20
- Allow additional policies to be attached to worker nodes (by @rottenbytes)
- Ability to specify a placement group for each worker group (by @matheuss)
@@ -251,13 +243,13 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Added optional name filter variable to be able to pin worker AMI to a release (by @max-rocket-internet)
- Added `--enable-docker-bridge` option for bootstrap.sh in AMI (by @michaelmccord)
-## [[v2.2.2](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.2.1...v2.2.2)] - 2019-02-25
+## [v2.2.2](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.2.1...v2.2.2) - 2019-02-25
- Ability to specify a path for IAM roles (by @tekn0ir)
-## [[v2.2.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.2.0...v2.2.1)] - 2019-02-18
+## [v2.2.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.2.0...v2.2.1) - 2019-02-18
-## [[v2.2.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.1.0...v2.2.0)] - 2019-02-07
+## [v2.2.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.1.0...v2.2.0) - 2019-02-07
- Ability to specify a permissions_boundary for IAM roles (by @dylanhellems)
- Ability to configure force_delete for the worker group ASG (by @stefansedich)
@@ -269,7 +261,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Fixed a bug where worker group defaults were being used for launch template user data (by @leonsodhi-lf)
- Managed_aws_auth option is true, the aws-auth configmap file is no longer created, and write_aws_auth_config must be set to true to generate config_map. (by @yutachaos)
-## [[v2.1.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.0.0...v2.1.0)] - 2019-01-15
+## [v2.1.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v2.0.0...v2.1.0) - 2019-01-15
- Initial support for worker groups based on Launch Templates (by @skang0601)
- Updated the `update_config_map_aws_auth` resource to trigger when the EKS cluster endpoint changes. This likely means that a new cluster was spun up so our ConfigMap won't exist (fixes #234) (by @elatt)
@@ -277,7 +269,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Fixed zsh-specific syntax in retry loop for aws auth config map (by @marcelloromani)
- Fix: fail deployment if applying the aws auth config map still fails after 10 attempts (by @marcelloromani)
-## [[v2.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.8.0...v2.0.0)] - 2018-12-14
+## [v2.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.8.0...v2.0.0) - 2018-12-14
- (Breaking Change) New input variables `map_accounts_count`, `map_roles_count` and `map_users_count` to allow using computed values as part of `map_accounts`, `map_roles` and `map_users` configs (by @chili-man on behalf of OpenGov).
- (Breaking Change) New variables `cluster_create_security_group` and `worker_create_security_group` to stop `value of 'count' cannot be computed` error.
@@ -288,7 +280,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Travis fixes (by @RothAndrew)
- Fixed some Windows compatibility issues (by @RothAndrew)
-## [[v1.8.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.7.0...v1.8.0)] - 2018-12-04
+## [v1.8.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.7.0...v1.8.0) - 2018-12-04
- Support for using AWS Launch Templates to define autoscaling groups (by @skang0601)
- `suspended_processes` to `worker_groups` input (by @bkmeneguello)
@@ -302,7 +294,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Removed providers from `main.tf`. (by @max-rocket-internet)
- Removed `configure_kubectl_session` references in documentation [#171](https://github.com/terraform-aws-modules/terraform-aws-eks/pull/171) (by @dominik-k)
-## [[v1.7.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.6.0...v1.7.0)] - 2018-10-09
+## [v1.7.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.6.0...v1.7.0) - 2018-10-09
- Worker groups can be created with a specified IAM profile. (from @laverya)
- exposed `aws_eks_cluster` create and destroy timeouts (by @RGPosadas)
@@ -313,7 +305,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Cosmetic syntax changes to improve readability. (by @max-rocket-internet)
- add `protect_from_scale_in` to solve issue #134 (by @kinghajj)
-## [[v1.6.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.5.0...v1.6.0)] - 2018-09-04
+## [v1.6.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.5.0...v1.6.0) - 2018-09-04
- add support for [`amazon-eks-node-*` AMI with bootstrap script](https://aws.amazon.com/blogs/opensource/improvements-eks-worker-node-provisioning/) (by @erks)
- expose `kubelet_extra_args` worker group option (replacing `kubelet_node_labels`) to allow specifying arbitrary kubelet options (e.g. taints and labels) (by @erks)
@@ -324,7 +316,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- **Breaking change** Removed support for `eks-worker-*` AMI. The cluster specifying a custom AMI based off of `eks-worker-*` AMI will have to rebuild the AMI from `amazon-eks-node-*`. (by @erks)
- **Breaking change** Removed `kubelet_node_labels` worker group option in favor of `kubelet_extra_args`. (by @erks)
-## [[v1.5.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.4.0...v1.5.0)] - 2018-08-30
+## [v1.5.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.4.0...v1.5.0) - 2018-08-30
- add spot_price option to aws_launch_configuration
- add enable_monitoring option to aws_launch_configuration
@@ -335,20 +327,20 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
If you are upgrading from 1.4 you should fix state after upgrade: `terraform state rm module.eks.data.http.workstation_external_ip`
- Can now selectively override keys in `workers_group_defaults` variable rather than callers maintaining a duplicate of the whole map. (by @dpiddockcmp)
-## [[v1.4.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.3.0...v1.4.0)] - 2018-08-02
+## [v1.4.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.3.0...v1.4.0) - 2018-08-02
- manage eks workers' root volume size and type.
- `workers_asg_names` added to outputs. (kudos to @laverya)
- New top level variable `worker_group_count` added to replace the use of `length(var.worker_groups)`. This allows using computed values as part of worker group configs. (complaints to @laverya)
-## [[v1.3.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.2.0...v1.3.0)] - 2018-07-11
+## [v1.3.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.2.0...v1.3.0) - 2018-07-11
- New variables `map_accounts`, `map_roles` and `map_users` in order to manage additional entries in the `aws-auth` configmap. (by @max-rocket-internet)
- kubelet_node_labels worker group option allows setting --node-labels= in kubelet. (Hat-tip, @bshelton229 👒)
- `worker_iam_role_arn` added to outputs. Sweet, @hatemosphere 🔥
- Worker subnets able to be specified as a dedicated list per autoscaling group. (up top, @bshelton229 🙏)
-## [[v1.2.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.1.0...v1.2.0)] - 2018-07-01
+## [v1.2.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.1.0...v1.2.0) - 2018-07-01
- new variable `pre_userdata` added to worker launch configuration allows to run scripts before the plugin does anything. (W00t, @jimbeck 🦉)
- kubeconfig made much more flexible. (Bang up job, @sdavids13 💥)
@@ -356,7 +348,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- Providing security groups didn't behave as expected. This has been fixed. (Good catch, @jimbeck 🔧)
- workstation cidr to be allowed by created security group is now more flexible. (A welcome addition, @jimbeck 🔐)
-## [[v1.1.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.0.0...v1.1.0)] - 2018-06-25
+## [v1.1.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v1.0.0...v1.1.0) - 2018-06-25
- new variable `worker_sg_ingress_from_port` allows to change the minimum port number from which pods will accept communication (Thanks, @ilyasotkov 👏).
- expanded on worker example to show how multiple worker autoscaling groups can be created.
@@ -367,13 +359,13 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- `kube-proxy` restart no longer needed in userdata. Good catch, @hatemosphere 🔥
- worker ASG reattachment wasn't possible when using `name`. Moved to `name_prefix` to allow recreation of resources. Kudos again, @hatemosphere 🐧
-## [[v1.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v0.2.0...v1.0.0)] - 2018-06-11
+## [v1.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v0.2.0...v1.0.0) - 2018-06-11
- security group id can be provided for either/both of the cluster and the workers. If not provided, security groups will be created with sufficient rules to allow cluster-worker communication. - kudos to @tanmng on the idea ⭐
- outputs of security group ids and worker ASG arns added for working with these resources outside the module.
- Worker build out refactored to allow multiple autoscaling groups each having differing specs. If none are given, a single ASG is created with a set of sane defaults - big thanks to @kppullin 🥨
-## [[v0.2.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v0.1.1...v0.2.0)] - 2018-06-08
+## [v0.2.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v0.1.1...v0.2.0) - 2018-06-08
- ability to specify extra userdata code to execute following kubelet services start.
- EBS optimization used whenever possible for the given instance type.
@@ -381,7 +373,7 @@ Map roles need to rename `role_arn` to `rolearn` and `group = ""` to `groups = [
- files rendered from dedicated templates to separate out raw code and config from `hcl`
- `workers_ami_id` is now made optional. If not specified, the module will source the latest AWS supported EKS AMI instead.
-## [[v0.1.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v0.1.0...v0.1.1)] - 2018-06-07
+## [v0.1.1](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v0.1.0...v0.1.1) - 2018-06-07
- Pre-commit hooks fixed and working.
- Made progress on CI, advancing the build to the final `kitchen test` stage before failing.
diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md
deleted file mode 100644
index b81ce2db90..0000000000
--- a/CONTRIBUTING.md
+++ /dev/null
@@ -1,13 +0,0 @@
-# Contributing
-
-When contributing to this repository, please first discuss the change you wish to make via issue,
-email, or any other method with the owners of this repository before making a change.
-
-Please note we have a code of conduct, please follow it in all your interactions with the project.
-
-## Pull Request Process
-
-1. Ensure any install or build dependencies are removed before the end of the layer when doing a build.
-2. Update the README.md with details of changes to the interface, this includes new environment variables, exposed ports, useful file locations and container parameters.
-3. Increase the version numbers in any examples files and the README.md to the new version that this Pull Request would represent. The versioning scheme we use is [SemVer](http://semver.org/).
-4. You may merge the Pull Request in once you have the sign-off of two other developers, or if you do not have permission to do that, you may request the second reviewer to merge it for you.
diff --git a/Makefile b/Makefile
new file mode 100644
index 0000000000..92c13f71f7
--- /dev/null
+++ b/Makefile
@@ -0,0 +1,17 @@
+.PHONY: changelog release
+
+SEMTAG=tools/semtag
+
+CHANGELOG_FILE=CHANGELOG.md
+TAG_QUERY=v11.0.0..
+
+scope ?= "minor"
+
+changelog-unrelease:
+ git-chglog -o $(CHANGELOG_FILE) $(TAG_QUERY)
+
+changelog:
+ git-chglog -o $(CHANGELOG_FILE) --next-tag `$(SEMTAG) final -s $(scope) -o -f` $(TAG_QUERY)
+
+release:
+ $(SEMTAG) final -s $(scope)
diff --git a/README.md b/README.md
index a21694b5ce..930961a988 100644
--- a/README.md
+++ b/README.md
@@ -132,7 +132,8 @@ Full contributing [guidelines are covered here](https://github.com/terraform-aws
## Change log
-The [changelog](https://github.com/terraform-aws-modules/terraform-aws-eks/tree/master/CHANGELOG.md) captures all important release notes.
+- The [changelog](https://github.com/terraform-aws-modules/terraform-aws-eks/tree/master/CHANGELOG.md) captures all important release notes from v11.0.0
+- For older release notes, refer to [changelog.pre-v11.0.0.md](https://github.com/terraform-aws-modules/terraform-aws-eks/tree/master/CHANGELOG.pre-v11.0.0.md)
## Authors
diff --git a/tools/semtag b/tools/semtag
new file mode 100755
index 0000000000..568d4241ad
--- /dev/null
+++ b/tools/semtag
@@ -0,0 +1,627 @@
+#!/usr/bin/env bash
+#
+# Thanks to @pnikosis for this script https://github.com/pnikosis/semtag
+#
+PROG=semtag
+PROG_VERSION="v0.1.0"
+
+SEMVER_REGEX="^v?(0|[1-9][0-9]*)\.(0|[1-9][0-9]*)\.(0|[1-9][0-9]*)(\-[0-9A-Za-z-]+(\.[0-9A-Za-z-]+)*)?(\+[0-9A-Za-z-]+(\.[0-9A-Za-z-]+)*)?$"
+IDENTIFIER_REGEX="^\-([0-9A-Za-z-]+)\.([0-9A-Za-z-]+)*$"
+
+# Global variables
+FIRST_VERSION="v0.0.0"
+finalversion=$FIRST_VERSION
+lastversion=$FIRST_VERSION
+hasversiontag="false"
+scope="patch"
+displayonly="false"
+forcetag="false"
+forcedversion=
+versionname=
+identifier=
+
+HELP="\
+Usage:
+ $PROG
+ $PROG getlast
+ $PROG getfinal
+ $PROG (final|alpha|beta|candidate) [-s (major|minor|patch|auto) | -o]
+ $PROG --help
+ $PROG --version
+Options:
+ -s The scope that must be increased, can be major, minor or patch.
+ The resulting version will match X.Y.Z(-PRERELEASE)(+BUILD)
+ where X, Y and Z are positive integers, PRERELEASE is an optionnal
+ string composed of alphanumeric characters describing if the build is
+ a release candidate, alpha or beta version, with a number.
+ BUILD is also an optional string composed of alphanumeric
+ characters and hyphens.
+ Setting the scope as 'auto', the script will chose the scope between
+ 'minor' and 'patch', depending on the amount of lines added (<10% will
+ choose patch).
+ -v Specifies manually the version to be tagged, must be a valid semantic version
+ in the format X.Y.Z where X, Y and Z are positive integers.
+ -o Output the version only, shows the bumped version, but doesn't tag.
+ -f Forces to tag, even if there are unstaged or uncommited changes.
+Commands:
+ --help Print this help message.
+ --version Prints the program's version.
+ get Returns both current final version and last tagged version.
+ getlast Returns the latest tagged version.
+ getfinal Returns the latest tagged final version.
+ getcurrent Returns the current version, based on the latest one, if there are uncommited or
+ unstaged changes, they will be reflected in the version, adding the number of
+ pending commits, current branch and commit hash.
+ final Tags the current build as a final version, this only can be done on the master branch.
+ candidate Tags the current build as a release candidate, the tag will contain all
+ the commits from the last final version.
+ alpha Tags the current build as an alpha version, the tag will contain all
+ the commits from the last final version.
+ beta Tags the current build as a beta version, the tag will contain all
+ the commits from the last final version."
+
+# Commands and options
+ACTION="getlast"
+ACTION="$1"
+shift
+
+# We get the parameters
+while getopts "v:s:of" opt; do
+ case $opt in
+ v)
+ forcedversion="$OPTARG"
+ ;;
+ s)
+ scope="$OPTARG"
+ ;;
+ o)
+ displayonly="true"
+ ;;
+ f)
+ forcetag="true"
+ ;;
+ \?)
+ echo "Invalid option: -$OPTARG" >&2
+ exit 1
+ ;;
+ :)
+ echo "Option -$OPTARG requires an argument." >&2
+ exit 1
+ ;;
+ esac
+done
+
+# Gets a string with the version and returns an array of maximum size of 5 with all the parts of the sematinc version
+# $1 The string containing the version in semantic format
+# $2 The variable to store the result array:
+# position 0: major number
+# position 1: minor number
+# position 2: patch number
+# position 3: identifier (or prerelease identifier)
+# position 4: build info
+function explode_version {
+ local __version=$1
+ local __result=$2
+ if [[ $__version =~ $SEMVER_REGEX ]] ; then
+ local __major=${BASH_REMATCH[1]}
+ local __minor=${BASH_REMATCH[2]}
+ local __patch=${BASH_REMATCH[3]}
+ local __prere=${BASH_REMATCH[4]}
+ local __build=${BASH_REMATCH[5]}
+ eval "$__result=(\"$__major\" \"$__minor\" \"$__patch\" \"$__prere\" \"$__build\")"
+ else
+ eval "$__result="
+ fi
+}
+
+# Compare two versions and returns -1, 0 or 1
+# $1 The first version to compare
+# $2 The second version to compare
+# $3 The variable where to store the result
+function compare_versions {
+ local __first
+ local __second
+ explode_version $1 __first
+ explode_version $2 __second
+ local lv=$3
+
+ # Compares MAJOR, MINOR and PATCH
+ for i in 0 1 2; do
+ local __numberfirst=${__first[$i]}
+ local __numbersecond=${__second[$i]}
+ case $(($__numberfirst - $__numbersecond)) in
+ 0)
+ ;;
+ -[0-9]*)
+ eval "$lv=-1"
+ return 0
+ ;;
+ [0-9]*)
+ eval "$lv=1"
+ return 0
+ ;;
+ esac
+ done
+
+ # Identifiers should compare with the ASCII order.
+ local __identifierfirst=${__first[3]}
+ local __identifiersecond=${__second[3]}
+ if [[ -n "$__identifierfirst" ]] && [[ -n "$__identifiersecond" ]]; then
+ if [[ "$__identifierfirst" > "$__identifiersecond" ]]; then
+ eval "$lv=1"
+ return 0
+ elif [[ "$__identifierfirst" < "$__identifiersecond" ]]; then
+ eval "$lv=-1"
+ return 0
+ fi
+ elif [[ -z "$__identifierfirst" ]] && [[ -n "$__identifiersecond" ]]; then
+ eval "$lv=1"
+ return 0
+ elif [[ -n "$__identifierfirst" ]] && [[ -z "$__identifiersecond" ]]; then
+ eval "$lv=-1"
+ return 0
+ fi
+
+ eval "$lv=0"
+}
+
+# Returns the last version of two
+# $1 The first version to compare
+# $2 The second version to compare
+# $3 The variable where to store the last one
+function get_latest_of_two {
+ local __first=$1
+ local __second=$2
+ local __result
+ local __latest=$3
+ compare_versions $__first $__second __result
+ case $__result in
+ 0)
+ eval "$__latest=$__second"
+ ;;
+ -1)
+ eval "$__latest=$__second"
+ ;;
+ 1)
+ eval "$__latest=$__first"
+ ;;
+ esac
+}
+
+# Assigns a 2 size array with the identifier, having the identifier at pos 0, and the number in pos 1
+# $1 The identifier in the format -id.#
+# $2 The vferiable where to store the 2 size array
+function explode_identifier {
+ local __identifier=$1
+ local __result=$2
+ if [[ $__identifier =~ $IDENTIFIER_REGEX ]] ; then
+ local __id=${BASH_REMATCH[1]}
+ local __number=${BASH_REMATCH[2]}
+ if [[ -z "$__number" ]]; then
+ __number=1
+ fi
+ eval "$__result=(\"$__id\" \"$__number\")"
+ else
+ eval "$__result="
+ fi
+}
+
+# Gets a list of tags and assigns the base and latest versions
+# Receives an array with the tags containing the versions
+# Assigns to the global variables finalversion and lastversion the final version and the latest version
+function get_latest {
+ local __taglist=("$@")
+ local __tagsnumber=${#__taglist[@]}
+ local __current
+ case $__tagsnumber in
+ 0)
+ finalversion=$FIRST_VERSION
+ lastversion=$FIRST_VERSION
+ ;;
+ 1)
+ __current=${__taglist[0]}
+ explode_version $__current ver
+ if [ -n "$ver" ]; then
+ if [ -n "${ver[3]}" ]; then
+ finalversion=$FIRST_VERSION
+ else
+ finalversion=$__current
+ fi
+ lastversion=$__current
+ else
+ finalversion=$FIRST_VERSION
+ lastversion=$FIRST_VERSION
+ fi
+ ;;
+ *)
+ local __lastpos=$(($__tagsnumber-1))
+ for i in $(seq 0 $__lastpos)
+ do
+ __current=${__taglist[i]}
+ explode_version ${__taglist[i]} ver
+ if [ -n "$ver" ]; then
+ if [ -z "${ver[3]}" ]; then
+ get_latest_of_two $finalversion $__current finalversion
+ get_latest_of_two $lastversion $finalversion lastversion
+ else
+ get_latest_of_two $lastversion $__current lastversion
+ fi
+ fi
+ done
+ ;;
+ esac
+
+ if git rev-parse -q --verify "refs/tags/$lastversion" >/dev/null; then
+ hasversiontag="true"
+ else
+ hasversiontag="false"
+ fi
+}
+
+# Gets the next version given the provided scope
+# $1 The version that is going to be bumped
+# $2 The scope to bump
+# $3 The variable where to stoer the result
+function get_next_version {
+ local __exploded
+ local __fromversion=$1
+ local __scope=$2
+ local __result=$3
+ explode_version $__fromversion __exploded
+ case $__scope in
+ major)
+ __exploded[0]=$((${__exploded[0]}+1))
+ __exploded[1]=0
+ __exploded[2]=0
+ ;;
+ minor)
+ __exploded[1]=$((${__exploded[1]}+1))
+ __exploded[2]=0
+ ;;
+ patch)
+ __exploded[2]=$((${__exploded[2]}+1))
+ ;;
+ esac
+
+ eval "$__result=v${__exploded[0]}.${__exploded[1]}.${__exploded[2]}"
+}
+
+function bump_version {
+ ## First we try to get the next version based on the existing last one
+ if [ "$scope" == "auto" ]; then
+ get_scope_auto scope
+ fi
+
+ local __candidatefromlast=$FIRST_VERSION
+ local __explodedlast
+ explode_version $lastversion __explodedlast
+ if [[ -n "${__explodedlast[3]}" ]]; then
+ # Last version is not final
+ local __idlast
+ explode_identifier ${__explodedlast[3]} __idlast
+
+ # We get the last, given the desired id based on the scope
+ __candidatefromlast="v${__explodedlast[0]}.${__explodedlast[1]}.${__explodedlast[2]}"
+ if [[ -n "$identifier" ]]; then
+ local __nextid="$identifier.1"
+ if [ "$identifier" == "${__idlast[0]}" ]; then
+ # We target the same identifier as the last so we increase one
+ __nextid="$identifier.$(( ${__idlast[1]}+1 ))"
+ __candidatefromlast="$__candidatefromlast-$__nextid"
+ else
+ # Different identifiers, we make sure we are assigning a higher identifier, if not, we increase the version
+ __candidatefromlast="$__candidatefromlast-$__nextid"
+ local __comparedwithlast
+ compare_versions $__candidatefromlast $lastversion __comparedwithlast
+ if [ "$__comparedwithlast" == -1 ]; then
+ get_next_version $__candidatefromlast $scope __candidatefromlast
+ __candidatefromlast="$__candidatefromlast-$__nextid"
+ fi
+ fi
+ fi
+ fi
+
+ # Then we try to get the version based on the latest final one
+ local __candidatefromfinal=$FIRST_VERSION
+ get_next_version $finalversion $scope __candidatefromfinal
+ if [[ -n "$identifier" ]]; then
+ __candidatefromfinal="$__candidatefromfinal-$identifier.1"
+ fi
+
+ # Finally we compare both candidates
+ local __resultversion
+ local __result
+ compare_versions $__candidatefromlast $__candidatefromfinal __result
+ case $__result in
+ 0)
+ __resultversion=$__candidatefromlast
+ ;;
+ -1)
+ __resultversion="$__candidatefromfinal"
+ ;;
+ 1)
+ __resultversion=$__candidatefromlast
+ ;;
+ esac
+
+ eval "$1=$__resultversion"
+}
+
+function increase_version {
+ local __version=
+
+ if [ -z $forcedversion ]; then
+ bump_version __version
+ else
+ if [[ $forcedversion =~ $SEMVER_REGEX ]] ; then
+ compare_versions $forcedversion $lastversion __result
+ if [ $__result -le 0 ]; then
+ echo "Version can't be lower than last version: $lastversion"
+ exit 1
+ fi
+ else
+ echo "Non valid version to bump"
+ exit 1
+ fi
+ __version=$forcedversion
+ fi
+
+ if [ "$displayonly" == "true" ]; then
+ echo "$__version"
+ else
+ if [ "$forcetag" == "false" ]; then
+ check_git_dirty_status
+ fi
+ local __commitlist
+ if [ "$finalversion" == "$FIRST_VERSION" ] || [ "$hasversiontag" != "true" ]; then
+ __commitlist="$(git log --pretty=oneline | cat)"
+ else
+ __commitlist="$(git log --pretty=oneline $finalversion... | cat)"
+ fi
+
+ # If we are forcing a bump, we add bump to the commit list
+ if [[ -z $__commitlist && "$forcetag" == "true" ]]; then
+ __commitlist="bump"
+ fi
+
+ if [[ -z $__commitlist ]]; then
+ echo "No commits since the last final version, not bumping version"
+ else
+ if [[ -z $versionname ]]; then
+ versionname=$(date -u +"%Y-%m-%dT%H:%M:%SZ")
+ fi
+ local __message="$versionname
+$__commitlist"
+
+ # We check we have info on the user
+ local __username=$(git config user.name)
+ if [ -z "$__username" ]; then
+ __username=$(id -u -n)
+ git config user.name $__username
+ fi
+ local __useremail=$(git config user.email)
+ if [ -z "$__useremail" ]; then
+ __useremail=$(hostname)
+ git config user.email "$__username@$__useremail"
+ fi
+
+ git tag -a $__version -m "$__message"
+
+ # If we have a remote, we push there
+ local __remotes=$(git remote)
+ if [[ -n $__remotes ]]; then
+ for __remote in $__remotes; do
+ git push $__remote $__version > /dev/null
+ if [ $? -eq 0 ]; then
+ echo "$__version pushed to $__remote"
+ else
+ echo "Error pushing the tag $__version to $__remote"
+ exit 1
+ fi
+ done
+ else
+ echo "$__version"
+ fi
+ fi
+ fi
+}
+
+function check_git_dirty_status {
+ local __repostatus=
+ get_work_tree_status __repostatus
+
+ if [ "$__repostatus" == "uncommitted" ]; then
+ echo "ERROR: You have uncommitted changes"
+ git status --porcelain
+ exit 1
+ fi
+
+ if [ "$__repostatus" == "unstaged" ]; then
+ echo "ERROR: You have unstaged changes"
+ git status --porcelain
+ exit 1
+ fi
+}
+
+# Get the total amount of lines of code in the repo
+function get_total_lines {
+ local __empty_id="$(git hash-object -t tree /dev/null)"
+ local __changes="$(git diff --numstat $__empty_id | cat)"
+ local __added_deleted=$1
+ get_changed_lines "$__changes" $__added_deleted
+}
+
+# Get the total amount of lines of code since the provided tag
+function get_sincetag_lines {
+ local __sincetag=$1
+ local __changes="$(git diff --numstat $__sincetag | cat)"
+ local __added_deleted=$2
+ get_changed_lines "$__changes" $__added_deleted
+}
+
+function get_changed_lines {
+ local __changes_numstat=$1
+ local __result=$2
+ IFS=$'\n' read -rd '' -a __changes_array <<<"$__changes_numstat"
+ local __diff_regex="^([0-9]+)[[:space:]]+([0-9]+)[[:space:]]+.+$"
+
+ local __total_added=0
+ local __total_deleted=0
+ for i in "${__changes_array[@]}"
+ do
+ if [[ $i =~ $__diff_regex ]] ; then
+ local __added=${BASH_REMATCH[1]}
+ local __deleted=${BASH_REMATCH[2]}
+ __total_added=$(( $__total_added+$__added ))
+ __total_deleted=$(( $__total_deleted+$__deleted ))
+ fi
+ done
+ eval "$2=( $__total_added $__total_deleted )"
+}
+
+function get_scope_auto {
+ local __verbose=$2
+ local __total=0
+ local __since=0
+ local __scope=
+
+ get_total_lines __total
+ get_sincetag_lines $finalversion __since
+
+ local __percentage=0
+ if [ "$__total" != "0" ]; then
+ local __percentage=$(( 100*$__since/$__total ))
+ if [ $__percentage -gt "10" ]; then
+ __scope="minor"
+ else
+ __scope="patch"
+ fi
+ fi
+
+ eval "$1=$__scope"
+ if [[ -n "$__verbose" ]]; then
+ echo "[Auto Scope] Percentage of lines changed: $__percentage"
+ echo "[Auto Scope] : $__scope"
+ fi
+}
+
+function get_work_tree_status {
+ # Update the index
+ git update-index -q --ignore-submodules --refresh > /dev/null
+ eval "$1="
+
+ if ! git diff-files --quiet --ignore-submodules -- > /dev/null
+ then
+ eval "$1=unstaged"
+ fi
+
+ if ! git diff-index --cached --quiet HEAD --ignore-submodules -- > /dev/null
+ then
+ eval "$1=uncommitted"
+ fi
+}
+
+function get_current {
+ if [ "$hasversiontag" == "true" ]; then
+ local __commitcount="$(git rev-list $lastversion.. --count)"
+ else
+ local __commitcount="$(git rev-list --count HEAD)"
+ fi
+ local __status=
+ get_work_tree_status __status
+
+ if [ "$__commitcount" == "0" ] && [ -z "$__status" ]; then
+ eval "$1=$lastversion"
+ else
+ local __buildinfo="$(git rev-parse --short HEAD)"
+ local __currentbranch="$(git rev-parse --abbrev-ref HEAD)"
+ if [ "$__currentbranch" != "master" ]; then
+ __buildinfo="$__currentbranch.$__buildinfo"
+ fi
+
+ local __suffix=
+ if [ "$__commitcount" != "0" ]; then
+ if [ -n "$__suffix" ]; then
+ __suffix="$__suffix."
+ fi
+ __suffix="$__suffix$__commitcount"
+ fi
+ if [ -n "$__status" ]; then
+ if [ -n "$__suffix" ]; then
+ __suffix="$__suffix."
+ fi
+ __suffix="$__suffix$__status"
+ fi
+
+ __suffix="$__suffix+$__buildinfo"
+ if [ "$lastversion" == "$finalversion" ]; then
+ scope="patch"
+ identifier=
+ local __bumped=
+ bump_version __bumped
+ eval "$1=$__bumped-dev.$__suffix"
+ else
+ eval "$1=$lastversion.$__suffix"
+ fi
+ fi
+}
+
+function init {
+ git fetch > /dev/null
+ TAGS="$(git tag)"
+ IFS=$'\n' read -rd '' -a TAG_ARRAY <<<"$TAGS"
+
+ get_latest ${TAG_ARRAY[@]}
+ currentbranch="$(git rev-parse --abbrev-ref HEAD)"
+}
+
+case $ACTION in
+ --help)
+ echo -e "$HELP"
+ ;;
+ --version)
+ echo -e "${PROG}: $PROG_VERSION"
+ ;;
+ final)
+ init
+ diff=$(git diff master | cat)
+ if [ "$forcetag" == "false" ]; then
+ if [ -n "$diff" ]; then
+ echo "ERROR: Branch must be updated with master for final versions"
+ exit 1
+ fi
+ fi
+ increase_version
+ ;;
+ alpha|beta)
+ init
+ identifier="$ACTION"
+ increase_version
+ ;;
+ candidate)
+ init
+ identifier="rc"
+ increase_version
+ ;;
+ getlast)
+ init
+ echo "$lastversion"
+ ;;
+ getfinal)
+ init
+ echo "$finalversion"
+ ;;
+ getcurrent)
+ init
+ get_current current
+ echo "$current"
+ ;;
+ get)
+ init
+ echo "Current final version: $finalversion"
+ echo "Last tagged version: $lastversion"
+ ;;
+ *)
+ echo "'$ACTION' is not a valid command, see --help for available commands."
+ ;;
+esac