Skip to content

Releases: cloudposse/terraform-aws-ec2-instance

v0.39.1

18 Aug 14:15
2d05315
Compare
Choose a tag to compare

🤖 Automatic Updates

chore(deps): update terraform cloudposse/security-group/aws to v0.3.2 @renovate (#106)

This PR contains the following updates:

Package Type Update Change
cloudposse/security-group/aws (source) module patch 0.3.1 -> 0.3.2

Release Notes

cloudposse/terraform-aws-security-group

v0.3.2

Compare Source

🚀 Enhancements

add missing required input (vpc_id) in the example @​Zaargh (#​20) #### what * add missing required input `vpc_id` in the example

Configuration

📅 Schedule: At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box.

This PR has been generated by WhiteSource Renovate. View repository job log here.

v0.39.0

20 Jul 00:02
0368f07
Compare
Choose a tag to compare
add iam role arn output @sebastianmacarescu (#105)

what

  • Add iam role arn output

why

  • for cross account reference in iam/bucket policies

v0.38.0

02 Jul 04:13
f5c4e19
Compare
Choose a tag to compare
Add ssm patch support @jamengual (#104)

what

  • move ssm to its own file
  • fix invalid resource reference

why

  • patch fix

v0.37.0

24 Jun 17:22
8c2ca76
Compare
Choose a tag to compare
v0.37.0 Pre-release
Pre-release
Adding SSM patch support @jamengual (#103)

what

  • Add SSM log bucket access
  • Add SSM policy for Patch Manager
  • Allow for Custom SSM policy

why

  • To be able to integrate with SSM patch and log the patch logs to an S3 bucket.

v0.36.0

15 Jun 19:21
f251bf5
Compare
Choose a tag to compare
feat: add missed vars for SG module and update deps @SweetOps (#100)

what

  • add missed vars for SG
  • bump to SG module to 0.3.1
  • update tests

why

  • bring configuration of security group/rules to one standard

references

  • CPCO-409

v0.35.0

14 Jun 16:34
1fc9595
Compare
Choose a tag to compare
Fix for EBS volumes created when the instance has been disabled, plus some vars description improvement @nnsense (#102)
  • Fixing #74 (EBS volumes will be created if enabled = false)
  • Fixing a wrong description provided for ebs_volume_encrypted in variables.tf
  • Changing some EBS related description to be clear those are "additional volumes"

what

Adding a local variable and a && to the creation of the EBS volumes we can avoid the creation of the additional volumes if the instance creation has been disabled.

references

v0.34.0

07 Jun 14:48
d5821e8
Compare
Choose a tag to compare
change network_interface to instance in aws_eip resource @ByJacob (#96)

what

  • Change network_interfface to instance in aws_eip

why

  • Unable to modify the network interface while the instance is in 'terminate' state

references

v0.33.0

03 Jun 14:30
a8bc162
Compare
Choose a tag to compare
Feat: Add instance_initiated_shutdown_behavior Variable @korenyoni (#101)

what

  • Add instance_initiated_shutdown_behavior variable

why

  • This variable allows for more fine-grained aws_instance resource customization

references

  • N/A

v0.32.2

20 May 22:55
1adf007
Compare
Choose a tag to compare

🤖 Automatic Updates

chore(deps): update terraform cloudposse/security-group/aws to v0.3.1 @renovate (#99)

This PR contains the following updates:

Package Type Update Change
cloudposse/security-group/aws (source) module minor 0.1.4 -> 0.3.1

Release Notes

cloudposse/terraform-aws-security-group

v0.3.1

Compare Source

🐛 Bug Fixes

Restore Terraform 0.13 support, fix #​12 @​Nuru (#​15) #### what - Restore Terraform 0.13 support - Fix #​12 - Add additional tests #### why - Lots of people still using Terraform 0.13 - Useful, requested functionality - Ensure against reversion of #​12 or #​13, protect against future issues with null values

v0.3.0

Compare Source

refactor: rework value mapping for for_each and update dependencies @​SweetOps (#​11) #### what * rework value mapping for `for_each` * bump minimal required version of TF to `0.14.0` * bump terratest to `v0.32.8` #### why * terraform has weird limitation which blocks using of dynamic values inside the `for_each` loop ```sh The "for_each" value depends on resource attributes that cannot be determined until apply, so Terraform cannot predict how many instances will be created. To work around this, use the -target argument to first apply only the resources that the for_each depends on. ```

v0.2.0

Compare Source

self conflicts with cidr_blocks error fix @​maximmi (#​14) #### what * default value for `self` field of security group rule changed to `null` #### why * With the provider `hashicorp/aws` `v3.38.0` new restrictions have been added to `aws_security_group_rule` resource #### references * closes #​13 * https://github.com/hashicorp/terraform-provider-aws/issues/15606 * https://github.com/hashicorp/terraform-provider-aws/pull/18467

Configuration

📅 Schedule: At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

♻️ Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box.

This PR has been generated by WhiteSource Renovate. View repository job log here.

v0.32.1

27 Apr 03:06
d7ddc15
Compare
Choose a tag to compare

🤖 Automatic Updates

chore(deps): update terraform cloudposse/security-group/aws to v0.1.4 @renovate (#88)

This PR contains the following updates:

Package Type Update Change
cloudposse/security-group/aws (source) terraform patch 0.1.2 -> 0.1.4

Release Notes

cloudposse/terraform-aws-security-group

v0.1.4

Compare Source

🚀 Enhancements

Add some missing TF 0.14 updates @​Nuru (#​10) #### what - Some updates included in the general TF 0.14 updates were missed. This brings the module up-to-date. #### why - Closes #​9

v0.1.3

Compare Source

🚀 Enhancements

create md5 from sec group rule description in order to allow multiple… @​1david5 (#​6)

… rules with the same port and different descriptions.

what

  • This PR generates the md5 hash from the security group rule description when creating the rule map keys.

why

  • This change prevents key map duplication when generating the security group rule map and there are rules with the same port and different descriptions. Example below:

main.tf

module "security_groups" 
  source = "github.com/cloudposse/terraform-aws-security-group"

  name        =  "sg_name"
  vpc_id      = "vpc-0000111122223333"
  rules       = [
        {
          type        = "ingress"
          from_port   = 22
          to_port     = 22
          protocol    = "tcp"
          cidr_blocks = "10.10.0.0/16"
          description = "Allow ssh from main office"
        },
        {
          type        = "ingress"
          from_port   = 22
          to_port     = 22
          protocol    = "tcp"
          cidr_blocks = "192.168.0.0/24"
          description = "Allow ssh from management VPC"
        },
        {
          type        = "egress"
          from_port   = 0
          to_port     = 65535
          protocol    = "all"
          cidr_blocks = ["0.0.0.0/0"]
          description = "Allow all outbound"
        }
      ]
  description = "sg_descrition"
}

ERROR

Error: Duplicate object key

  on .terraform/modules/security_groups/main.tf line 11, in locals:
   9:   rules = module.this.enabled && var.rules != null ? {
  10:     for rule in flatten(distinct(var.rules)) :
  11:     format("%s-%s-%s-%s-%s-%s-%s-%s-%s-%s",
  12:       rule.type,
  13:       rule.protocol,
  14:       rule.from_port,
  15:       rule.to_port,
  16:       lookup(rule, "cidr_blocks", null) == null ? "no_ipv4" : "ipv4",
  17:       lookup(rule, "ipv6_cidr_blocks", null) == null ? "no_ipv6" : "ipv6",
  18:       lookup(rule, "security_group_id", null) == null ? "no_ssg" : "ssg",
  19:       lookup(rule, "prefix_list_ids", null) == null ? "no_pli" : "pli",
  20:       lookup(rule, "self", null) == null ? "no_self" : "self",
  21:       lookup(rule, "description", null) == null ? "no_desc" : "desc"
  22:     ) => rule
  23:   } : {}
    |----------------
    | rule.from_port is 22
    | rule.protocol is "tcp"
    | rule.to_port is 22
    | rule.type is "ingress"

Two different items produced the key
"ingress-tcp-22-22-ipv4-no_ipv6-no_ssg-no_pli-no_self-desc" in this 'for'
expression. If duplicates are expected, use the ellipsis (...) after the value
expression to enable grouping by key.

references


Configuration

📅 Schedule: At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

♻️ Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box.

This PR has been generated by WhiteSource Renovate. View repository job log here.