Skip to content

Releases: cloudposse/terraform-aws-elastic-beanstalk-environment

v0.35.2

03 Feb 05:15
48e2cd4
Compare
Choose a tag to compare

🤖 Automatic Updates

Update Terraform cloudposse/route53-cluster-hostname/aws to v0.10.1 @renovate (#161)

This PR contains the following updates:

Package Type Update Change
cloudposse/route53-cluster-hostname/aws (source) terraform patch 0.10.0 -> 0.10.1

Release Notes

cloudposse/terraform-aws-route53-cluster-hostname

v0.10.1

Compare Source

🤖 Automatic Updates

Update README.md and docs @​cloudpossebot (#​33) #### what This is an auto-generated PR that updates the README.md and docs #### why To have most recent changes of README.md and doc from origin templates

v0.35.1

03 Feb 04:28
c476aa9
Compare
Choose a tag to compare

🤖 Automatic Updates

Update README.md and docs @cloudpossebot (#160)

what

This is an auto-generated PR that updates the README.md and docs

why

To have most recent changes of README.md and doc from origin templates

v0.35.0

29 Jan 06:22
38084c3
Compare
Choose a tag to compare
mfa_delete removed @maximmi (#159)

what

  • mfa_delete removed
  • Bridgecrew check Ensure S3 bucket has MFA delete enabled skipped

why

references

v0.34.0

26 Jan 04:37
3a37969
Compare
Choose a tag to compare
readme updated, BridgeCrew compliance checks fixed, code cleaned @maximmi (#158)

what

  • BridgeCrew compliance checks fix
  • readme updated
  • default behaviour changed: S3 bucket MFA delete enabled by default
  • default behaviour changed: S3 Bucket Versioning enabled by default
  • default behaviour changed: Encryption of the S3 bucket enabled by default

why

  • To be able to position our modules as standards compliant
  • stay in sync with code
  • To comply BridgeCrew check

references

v0.33.0

23 Jan 15:30
de08d72
Compare
Choose a tag to compare
Terraform 0.14 upgrade @maximmi (#156)

what

  • Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard

why

  • Support Terraform 0.14

v0.32.1

06 Jan 22:13
85fdbb4
Compare
Choose a tag to compare

🤖 Automatic Updates

Update Terraform cloudposse/route53-cluster-hostname/aws to v0.10.0 @renovate (#157)

This PR contains the following updates:

Package Type Update Change
cloudposse/route53-cluster-hostname/aws (source) terraform minor 0.9.0 -> 0.10.0

Release Notes

cloudposse/terraform-aws-route53-cluster-hostname

v0.10.0

Compare Source

Terraform 0.14 upgrade @​maximmi (#​32) #### what - Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard #### why - Support Terraform 0.14

v0.32.0

27 Dec 20:40
e61deb2
Compare
Choose a tag to compare
Terraform 0.14 upgrade @maximmi (#153)

what

  • Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard

why

  • Support Terraform 0.14

v0.31.0

16 Oct 19:35
cc92c16
Compare
Choose a tag to compare
Allow to restrict S3 access @anton-kachurin (#143)

what

Adds two variables extended_ec2_policy_document and prefer_legacy_ssm_policy to be able to control IAM policies attached to EC2 instance roles.

why

As noted in #75, currently EC2 instances are configured with a role that gives full S3 access. This is undesirable for security reasons.

  • AmazonEC2RoleforSSM is a managed policy allowing to use SSM features (Session Manager, for example) with EC2 instances and it gives full S3 access.
  • There is an inline policy containing a statement with SID AllowS3OperationsOnElasticBeanstalkBuckets that also grants full S3 access.

The prefer_legacy_ssm_policy variable (when set to false) will replace AmazonEC2RoleforSSM with AmazonSSMManagedInstanceCore which is recommended by AWS: https://docs.aws.amazon.com/systems-manager/latest/userguide/setup-instance-profile.html
By default, it's set to true for backward compatibility.

The extended_ec2_policy_document variable takes in a JSON that may be used to override existing policy statements as long as a statement has an SID. See examples/complete/main.tf for example usage.

references

closes #75

v0.30.0

18 Aug 23:18
44bbccd
Compare
Choose a tag to compare
Add missing resource attributes to Spot. @razorsedge (#131)

what

  • Four settings relating to EC2 Spot prices (added in #115) were missing an empty resource attribute. This causes terraform apply to constantly reapply the configuration, even if no code or Beanstalk config has changed.

why

  • As #43 shows, terraform 0.12.x shows settings changes during terraform plan when no changes were done.

references

v0.29.0

18 Aug 16:32
8f1c785
Compare
Choose a tag to compare
Additional TF 0.13 Fixes @osterman (#135)

what

  • upgrade chatops
  • add automatic releasing
  • upgrade to go modules
  • update any version pinning
  • (locally verififed) no terraform init errors using cli

why

  • Support Terraform 0.13