Releases: cloudposse/terraform-aws-vpc-flow-logs-s3-bucket
v1.3.0
v1.2.0
🤖 Automatic Updates
chore(deps): update terraform cloudposse/s3-log-storage/aws to v1.4.3 (main) @renovate (#69)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/s3-log-storage/aws (source) | module | patch | 1.4.2 -> 1.4.3 |
Release Notes
cloudposse/terraform-aws-s3-log-storage (cloudposse/s3-log-storage/aws)
v1.4.3
🤖 Automatic Updates
Update Terraform cloudposse/s3-bucket/aws to v3.1.3 (main) @renovate (#95)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/s3-bucket/aws (source) | module | patch | 3.1.2 -> 3.1.3 |
Release Notes
cloudposse/terraform-aws-s3-bucket (cloudposse/s3-bucket/aws)
v3.1.3
Unfortunately, this change makes count
unknown at plan time in certain situations. In general, you cannot use the output of compact()
in count
.
The solution is to stop using the deprecated policy
input and revert to 3.1.2 or upgrade to 4.0.
🚀 Enhancements
Fix `source_policy_documents` combined with `var.policy` being ignored @​johncblandii (#​201)
what
- Changed
var.source_policy_documents
tolocal.source_policy_documents
sovar.policy
usage was still supported
why
- The ternary check uses
var,source_policy_documents
sovar.policy
being combined withvar.source_policy_documents
intolocal.source_policy_documents
does not providetrue
for the ternary to execute
references
Update README.md and docs @cloudpossebot (#94)
what
This is an auto-generated PR that updates the README.md and docs
why
To have most recent changes of README.md and doc from origin templates
Bump the go_modules group in /test/src with 5 updates @dependabot (#84)
Bumps the go_modules group in /test/src with 5 updates:
Package | From | To |
---|---|---|
github.com/hashicorp/go-getter | 1.7.1 |
1.7.5 |
golang.org/x/crypto | 0.1.0 |
0.17.0 |
golang.org/x/net | 0.7.0 |
0.10.0 |
google.golang.org/grpc | 1.51.0 |
1.56.3 |
google.golang.org/protobuf | 1.28.1 |
1.30.0 |
Updates github.com/hashicorp/go-getter
from 1.7.1 to 1.7.5
Release notes
Sourced from github.com/hashicorp/go-getter's releases.
v1.7.5
What's Changed
- Prevent Git Config Alteration on Git Update by
@dduzgun-security
in hashicorp/go-getter#497New Contributors
@dduzgun-security
made their first contribution in hashicorp/go-getter#497Full Changelog: hashicorp/go-getter@v1.7.4...v1.7.5
v1.7.4
What's Changed
- Escape user-provided strings in
git
commands hashicorp/go-getter#483- Fixed a bug in
.netrc
handling if the file does not exist hashicorp/go-getter#433Full Changelog: hashicorp/go-getter@v1.7.3...v1.7.4
v1.7.3
What's Changed
- SEC-090: Automated trusted workflow pinning (2023-04-21) by
@hashicorp-tsccr
in hashicorp/go-getter#432- SEC-090: Automated trusted workflow pinning (2023-09-11) by
@hashicorp-tsccr
in hashicorp/go-getter#454- SEC-090: Automated trusted workflow pinning (2023-09-18) by
@hashicorp-tsccr
in hashicorp/go-getter#458- don't change GIT_SSH_COMMAND when there is no sshKeyFile by
@jbardin
in hashicorp/go-getter#459New Contributors
@hashicorp-tsccr
made their first contribution in hashicorp/go-getter#432Full Changelog: hashicorp/go-getter@v1.7.2...v1.7.3
v1.7.2
What's Changed
- Don't override
GIT_SSH_COMMAND
when not needed by@nl-brett-stime
hashicorp/go-getter#300Full Changelog: hashicorp/go-getter@v1.7.1...v1.7.2
Commits
5a63fd9
Merge pull request #497 from hashicorp/fix-git-update5b7ec5f
fetch tags on update and fix tests9906874
recreate git config during update to prevent config alteration268c11c
escape user provide string to git (#483)975961f
Merge pull request #433 from adrian-bl/netrc-fix0298a22
Merge pull request #459 from hashicorp/jbardin/setup-git-envc70d9c9
don't change GIT_SSH_COMMAND if there's no keyfile3d5770f
Merge pull request #458 from hashicorp/tsccr-auto-pinning/trusted/2023-09-180688979
Result of tsccr-helper -log-level=info -pin-all-workflows .e66f244
Merge pull request #454 from hashicorp/tsccr-auto-pinning/trusted/2023-09-11- Additional commits viewable in compare view
Updates golang.org/x/crypto
from 0.1.0 to 0.17.0
Commits
9d2ee97
ssh: implement strict KEX protocol changes
v1.1.0
v1.0.1
🤖 Automatic Updates
Update Terraform cloudposse/s3-bucket/aws to v3.1.1 (master) @renovate (#88)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/s3-bucket/aws (source) | module | patch | 3.1.0 -> 3.1.1 |
Release Notes
cloudposse/terraform-aws-s3-bucket
v3.1.1
🐛 Bug Fixes
Revert change to Transfer Acceleration from #​178 @​Nuru (#​180)
what
- Revert change to Transfer Acceleration from #178
why
- Transfer Acceleration is not available in every region, and the change in #178 (meant to detect and correct drift) does not work (throws API errors) in regions where Transfer Acceleration is not supported
v1.3.0
🚀 Enhancements
Enhance lifecycle object with optionals, limit length of bucket name @Nuru (#87)
what
- Limit length of auto-generated bucket name to match AWS-imposed limit
- Enhance
lifecycle_configuration_rules
to be fully defined with optional members
why
- Avoid situation where module fails because auto-generated bucket name is too long
- Make it easier to build a list of rules
references
🤖 Automatic Updates
chore(deps): update terraform cloudposse/s3-log-storage/aws to v1.3.1 (master) @renovate (#57)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/s3-log-storage/aws (source) | module | minor | 1.2.0 -> 1.3.1 |
Release Notes
cloudposse/terraform-aws-s3-log-storage
v1.3.1
🚀 Enhancements
Update Terraform cloudposse/s3-bucket/aws to v3.1.1 (master) @renovate (#88)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/s3-bucket/aws (source) | module | patch | 3.1.0 -> 3.1.1 |
Release Notes
cloudposse/terraform-aws-s3-bucket
v3.1.1
🐛 Bug Fixes
Revert change to Transfer Acceleration from #​178 @​Nuru (#​180)
what
- Revert change to Transfer Acceleration from #178
why
- Transfer Acceleration is not available in every region, and the change in #178 (meant to detect and correct drift) does not work (throws API errors) in regions where Transfer Acceleration is not supported
🤖 Automatic Updates
Update Terraform cloudposse/s3-bucket/aws to v3.1.1 (master) @renovate (#88)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/s3-bucket/aws (source) | module | patch | 3.1.0 -> 3.1.1 |
Release Notes
cloudposse/terraform-aws-s3-bucket
v3.1.1
🐛 Bug Fixes
Revert change to Transfer Acceleration from #​178 @​Nuru (#​180)
what
- Revert change to Transfer Acceleration from #178
why
- Transfer Acceleration is not available in every region, and the change in #178 (meant to detect and correct drift) does not work (throws API errors) in regions where Transfer Acceleration is not supported
v1.3.0
🚀 Enhancements
Enhance lifecycle object with optionals, limit length of bucket name @Nuru (#87)
what
- Limit length of auto-generated bucket name to match AWS-imposed limit
- Enhance
lifecycle_configuration_rules
to be fully defined with optional members
why
- Avoid situation where module fails because auto-generated bucket name is too long
- Make it easier to build a list of rules
references
v1.0.0
S3 log storage upgrade @Nuru (#54)
what && why
- Update
s3-log-storage
module to current 1.2.0. Fixes #53 - Add
bucket_name
input and validation. Resolves #48 - Add
object_lock_configuration
to keep in sync with upstream modules - Add new
lifecycle_configuration_rules
input and deprecate old individual settings to provide more flexibility and keep in sync with upstream modules - Update framework workflows and test rigs
- Require Terraform version >= 1.3.0
references
git.io->cloudposse.tools update @dylanbannon (#42)
what and why
Change all references to git.io/build-harness
into cloudposse.tools/build-harness
, since git.io
redirects will stop working on April 29th, 2022.
References
- DEV-143
v0.18.0
Allow for Custom KMS Keys for VPC-Flow-Logs S3 Bucket Encryption @zackery-parkhurst (#45)
Allow for Custom KMS Keys for VPC-Flow-Logs S3 Bucket Encryption.
what
- Conditionally create KMS Key that module creates
- New variables
use_custom_kms
andcustom_kms_arn
to control the feature.
why
- So end users can create / manage their own KMS keys for VPC-Flow-Logs.
- We are now creating Multi Region KMS Keys/Replicas for all of our other “Audit Log” Buckets encryption.
- Other CP modules, such as s3-log-stoarge, cloudtrail-bucket, config-bucket have the ability to pass in your own kms_master_key_arn and the module not create a KMS Key for you.
v0.17.0
feat: add access logging to vpc-flow-logs-s3-bucket module @zackery-parkhurst (#44)
what
- Add two new variables: access_log_bucket_name and access_log_bucket_prefix which are passed into another upstream CP repository aws-s3-log-storage.
why
- It would be beneficial to be able to audit access logging to VPC-Flow-Log Buckets.
- Nnot having server access logging enabled on buckets can result in a SecurityHub alert. And has in our particular environment.
- Functionality already exists just need to use it by passing in variables to existing CP repository aws-s3-log-storage.
v0.16.2
🤖 Automatic Updates
chore(deps): update terraform cloudposse/kms-key/aws to v0.12.1 @renovate (#41)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/kms-key/aws (source) | module | patch | 0.12.0 -> 0.12.1 |
Release Notes
cloudposse/terraform-aws-kms-key
v0.12.1
🚀 Enhancements
Fix: Update Version Constraints @nitrocode (#31)
#### what * Provider bump #### why * Prevent stale .terraform directories from preventing planning this module #### references * https://github.com/cloudposse/terraform-aws-kms-key/pull/30Fix: Update Version Constraints @nitrocode (#31)
#### what * Provider bump #### why * Prevent stale .terraform directories from preventing planning this module #### references * https://github.com/cloudposse/terraform-aws-kms-key/pull/30Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- If you want to rebase/retry this PR, click this checkbox.
This PR has been generated by WhiteSource Renovate. View repository job log here.
v0.16.1
🤖 Automatic Updates
chore(deps): update terraform cloudposse/kms-key/aws to v0.12.0 @renovate (#40)
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
cloudposse/kms-key/aws (source) | module | minor | 0.11.0 -> 0.12.0 |
Release Notes
cloudposse/terraform-aws-kms-key
v0.12.0
🚀 Enhancements
Feat: Add `multi_region` variable for multi-region CMKs @nitrocode (#30)
#### what * Add multi_region #### why * for keys that need to be used cross region * note this change will require 3.64.0 provider going forward #### references * https://aws.amazon.com/about-aws/whats-new/2021/06/kms-multi-region-keys/ * https://github.com/hashicorp/terraform-provider-aws/releases/tag/v3.64.0Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- If you want to rebase/retry this PR, click this checkbox.
This PR has been generated by WhiteSource Renovate. View repository job log here.