Releases: cloudposse/terraform-aws-components
v1.499.0
v1.498.0
feat: support delete protection for dynamodb @brett-au (#1118)
what
terraform-aws-dynamodb v0.36.0 supports delete protection on the table. This Pull request exposes that upstream variable
why
Delete safe dynamodb tables in the dynamo component
references
https://github.com/cloudposse/terraform-aws-dynamodb/blob/0.36.0/variables.tf#L184-L188
v1.497.0
v1.496.0
Lamdba Component Update @Benbentwo (#1115)
what
- Removed unused variables (the module never used several)
- Added several
trigger_{type}.tffiles to support Triggering the lambda via- S3
- SQS
- CronJob (Cloudwatch Event)
- Updated module to latest
- Added lookup support for bucket where code is stored via remote state lookup - or hardcoded bucket name.
why
- Module version was behind - several variables were planned to be used but never implemented.
- Triggers are commonly needed for lambdas, so we should bake a few into the component - eventually maybe these go to their own module
- Tried to keep backwards compatibility with all types (
files / zip,imageands3 bucket) - Removed formatting of bucket name in favor of component lookup. Formatting made bucket lookup in another region or stage difficult. Escape hatch of bucket_name still exists
references
v1.495.0
feat: adds version upgrade variable input to component @wavemoran (#1113)
what
- Adds the
auto_minor_version_upgradeargument for theaws_elasticache_replication_groupresource - Updates the
redismodule version to1.4.1
why
auto_minor_version_upgradeargument is missing from the component- Module is a few minor versions behind upstream
references
- https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elasticache_replication_group#auto_minor_version_upgrade
- https://github.com/cloudposse/terraform-aws-elasticache-redis/tree/main
- Release notes between
1.2.2and1.4.1- https://github.com/cloudposse/terraform-aws-elasticache-redis/releases/tag/1.2.3
- https://github.com/cloudposse/terraform-aws-elasticache-redis/releases/tag/1.3.0
- https://github.com/cloudposse/terraform-aws-elasticache-redis/releases/tag/1.4.0
- https://github.com/cloudposse/terraform-aws-elasticache-redis/releases/tag/1.4.1
v1.494.0
Add explicit parameter store path @wavemoran (#1110)
what
- Add the exact AWS SSM Parameter Store path for IAM permissions
why
- When using the
find.pathvalue, ESO will begin the traversal at the exact path defined. ssm:GetParametersByPathneeds permission to the "root" path, egarn:aws:ssm:us-west-2:123456789012:parameter/app
references
v1.493.0
v1.492.0
fix: Correct recommended `var.name` for `auth0/app` @milldr (#1108)
what
- Update recommended
nameof theauth0/appcomponents to avoid conflicts with theauth0/tenantcomponent
why
- Both were using
auth0asnamebefore. This results in both components using the samemodule.this.id, which they both use to write AWS SSM parameters. These were clobbering each other and breaking the provider authentication
references
- client engagement
v1.491.0
Correct Auth0 Parameter Intention @milldr (#1107)
what
- Removed duplicated SSM parameters for Auth0 Tenant
- Added SSM parameter for Auth0 App's Client ID wherever it's deployed
- Create client credentials for auth0 apps
why
- Originally the requested parameters were misunderstood. We want to create a client ID for each new Auth0 app. We don't need to duplicate the tenant parameters
references
- customer engagment
v1.490.0
Add `site-to-site-vpn` Terraform/OpenTofu component @aknysh (#1106)
what
- Add
site-to-site-vpnTerraform/OpenTofu component
why
-
The component provisions a Site-To-Site VPN with a target AWS VPC on one side of the tunnel. The other (customer) side can be any VPN gateway endpoint, e.g. a hardware device, other cloud VPN, etc.
AWS Site-to-Site VPN is a fully-managed service that creates a secure connection between your data center or branch
office and your AWS resources using IP Security (IPSec) tunnels. When using Site-to-Site VPN, you can connect to both
your Amazon Virtual Private Clouds (VPC) and AWS Transit Gateway, and two tunnels per connection are used for
increased redundancy.The component provisions the following resources:
-
AWS Virtual Private Gateway (a representation of the AWS side of the tunnel)
-
AWS Customer Gateway (a representation of the other (remote) side of the tunnel). It requires:
- The gateway's Border Gateway Protocol (BGP) Autonomous System Number (ASN)
/32IP of the VPN endpoint
-
AWS Site-To-Site VPN connection. It creates two VPN tunnels for redundancy and requires:
- The IP CIDR ranges on each side of the tunnel
- Pre-shared Keys for each tunnel (can be auto-generated if not provided and saved into SSM Parameter Store)
- (Optional) IP CIDR ranges to be used inside each VPN tunnel
-
Route table entries to direct the appropriate traffic from the local VPC to the other side of the tunnel
-