Releases: cloudposse/terraform-aws-cloudfront-s3-cdn
v0.76.0
Add response headers policy input for CloudFront distributions default behaviour @itschrishudson (#195)
what
- Adds an input to pass a response headers policy ID into the CloudFront distribution in the default cache behaviour.
why
- AWS have recently released the ability to generate response header policies to add response headers for CORS/Security and custom use cases instead of setting at the origin or using a Lambda.
- The current module does not allow you to pass in the ID of a policy in order to associate it with a the CloudFront distributions default behaviour.
references
v0.75.0
Enable compression of responses by default @alexjurkiewicz (#173)
Compression of responses is free, and should always be a net-positive.
v0.74.3
🤖 Automatic Updates
Update Terraform cloudposse/s3-log-storage/aws to v0.24.1 @renovate (#170)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/s3-log-storage/aws (source) | module | minor | 0.20.0 -> 0.24.1 |
Release Notes
cloudposse/terraform-aws-s3-log-storage
v0.24.1
🤖 Automatic Updates
Update context.tf @cloudpossebot (#59)
#### what This is an auto-generated PR that updates the `context.tf` file to the latest version from `cloudposse/terraform-null-label` #### why To support all the features of the `context` interface.v0.24.0
Add variable access_log_bucket_prefix to customize S3 access log configuration @adamantike (#57)
#### What Allow changing the prefix to be used in the specified S3 bucket for access logs. Maintain current prefix as default value, for backwards compatibility. #### Why This is useful for projects using different standards (e.g. path with bucket name in the root folder).v0.23.0
add allow_ssl_requests_only flag @mcalhoun (#56)
#### what- fix bug from #55
why
- There was a missing
data "aws_partition"
v0.22.0
add allow_ssl_requests_only flag @mcalhoun (#55)
#### what- Add the
allow_ssl_requests_only
flag to force the bucket to be accessed via TLS only
why
- AWS Foundational Security Best practices indicate S3 buckets should require requests to use Secure Socket Layer
references
v0.21.0
added versioning mfa delete enabled option @chafnan (#54)
#### what This adds the option to turn on MFA Delete for the bucket. * Describe high-level what changed as a result of these commits (i.e. in plain-english, what do these changes mean?) * Use bullet points to be concise and to the point. #### why issue #48 does a good job explaining, but pasted important information belowSecurity best practices for CloudTrail logs that are stored in S3 recommend MFA Delete be enabled.
https://www.cloudconformity.com/knowledge-base/aws/CloudTrail/cloudtrail-bucket-mfa-delete-enabled.html
references
closes #48
Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- If you want to rebase/retry this PR, check this box.
This PR has been generated by WhiteSource Renovate. View repository job log here.
v0.74.2
🤖 Automatic Updates
Update Terraform cloudposse/label/null to v0.25.0 @renovate (#180)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/label/null (source) | module | minor | 0.24.1 -> 0.25.0 |
Release Notes
cloudposse/terraform-null-label
v0.25.0
Add "tenant", "labels_as_tags", and "descriptors" @Nuru (#132)
##### what - Add additional label and `id` component: `tenant` - New input `labels_as_tags` controls which labels are exported as tags - New input `descriptor_formats` generates new output `descriptors` - Update README, remove link to obsolete `terraform-terraform-label` ##### why - Support users that host resources on behalf of and/or dedicated to single customers - Supersedes and closes #131, giving people control over which tags the module generates - Simple mechanism for creating multiple identifiers from the same inputs, reducing the need to create multiple instances of `null-label` - Document `tenant`, `labels_as_tags`, `descriptor_formats`, add additional clarification, stop promoting obsolete moduleFix: Update README Snippets @korenyoni (#130)
##### what * Update README snippets to reflect use of Terraform Registry. ##### why * Including snippets that reflect use of the Terraform Registry make it easier for users to quickly instantiate a null_label module. * README is out of date and does not include snippets that reflect use of the Terraform Registry. ##### references * N/ABridgecrew compliance @Nuru (#125)
##### what - Resolve Bridgecrew compliance complaint about example Autoscaling Group (BC_AWS_GENERAL_31) - Fix typo in README - Include Terraform lock file in `.gitignore` ##### why - Get clean Bridgecrew badge - Correct confusing error - Ensure lock files are not checked into GitHub ##### note The PR can and should be merged into `master` to update README and Bridgecrew without triggering a new release/version. These changes have no effect on the actual module in use and a release will create unnecessary ripple effects. However, merging to `master` will update the README and badges, so is worthwhile, and the changes will move forward into the next release.Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- If you want to rebase/retry this PR, check this box.
This PR has been generated by WhiteSource Renovate. View repository job log here.
v0.74.1
🤖 Automatic Updates
Update context.tf @cloudpossebot (#181)
what
This is an auto-generated PR that updates the context.tf
file to the latest version from cloudposse/terraform-null-label
why
To support all the features of the context
interface.
v0.74.0
Add trusted_* vars per ordered_cache @martinlindner (#176)
what
Add individual trusted_signers
, trusted_key_groups
attributes to var.ordered_cache
.
why
- "Private content" / signature checks should be configurable on a per-behavior level instead of just enforcing the global settings for all.
v0.73.0
Feat: Add Support for Origin Groups (Failover Origins) @korenyoni (#174)
what
- Add Support for Origin Groups (failover origins)
- Add tests for
var.s3_origins
andvar.custom_origins
- Add functionality such that if
s3_origin_config.origin_access_identity
invar.s3_origins
isnull
or an empty string, translate it to theorigin_access_identity
used by the origin created by the module.
why
- Certain CloudFront distributions require origins to be backed by failover origins. This can only be done using Origin Groups, which prior to this PR is not supported by the module.
- The variables
var.s3_origins
andvar.custom_origins
were not tested using the test suite.
references
v0.72.1
🚀 Enhancements
Fix README Snippet Use of `deployment_principal_arns` @korenyoni (#172)
what
- Fix use of
deployment_principal_arns
variable in README snippet.
why
- The IAM Role ARN supplied in the
deployment_principal_arns
map is actually using S3 ARNs. This fixes the ARNs such that they are IAM Role ARNs.
references
- N/A