tf-free
tf-free copied to clipboard
Update Terraform cloudposse/tfstate-backend/aws to v0.40.1
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| cloudposse/tfstate-backend/aws (source) | module | minor | 0.38.1 -> 0.40.1 |
Release Notes
cloudposse/terraform-aws-tfstate-backend
v0.40.1: S3 updates
π€ Automatic Updates
Update Terraform cloudposse/s3-log-storage/aws to v1.3.1 (release/v0) @βrenovate (#β134)
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| cloudposse/s3-log-storage/aws (source) | module | minor | 1.1.0 -> 1.3.1 |
Release Notes
cloudposse/terraform-aws-s3-log-storage
v1.3.1
π Enhancements
Update Terraform cloudposse/s3-bucket/aws to v3.1.1 (master) @ββ8203;renovate (#β8203;88)
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| cloudposse/s3-bucket/aws (source) | module | patch | 3.1.0 -> 3.1.1 |
Release Notes
cloudposse/terraform-aws-s3-bucket
v3.1.1
π Bug Fixes
Revert change to Transfer Acceleration from #β8203;8203;178 @ββ8203;β8203;8203;Nuru (#β8203;8203;180)
what
- Revert change to Transfer Acceleration from #β178
why
- Transfer Acceleration is not available in every region, and the change in #β178 (meant to detect and correct drift) does not work (throws API errors) in regions where Transfer Acceleration is not supported
π€ Automatic Updates
Update Terraform cloudposse/s3-bucket/aws to v3.1.1 (master) @ββ8203;renovate (#β8203;88)
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| cloudposse/s3-bucket/aws (source) | module | patch | 3.1.0 -> 3.1.1 |
Release Notes
cloudposse/terraform-aws-s3-bucket
v3.1.1
π Bug Fixes
Revert change to Transfer Acceleration from #β8203;8203;178 @ββ8203;β8203;8203;Nuru (#β8203;8203;180)
what
- Revert change to Transfer Acceleration from #β178
why
- Transfer Acceleration is not available in every region, and the change in #β178 (meant to detect and correct drift) does not work (throws API errors) in regions where Transfer Acceleration is not supported
v1.3.0
π Enhancements
Enhance lifecycle object with optionals, limit length of bucket name @ββ8203;Nuru (#β8203;87)
what
- Limit length of auto-generated bucket name to match AWS-imposed limit
- Enhance
lifecycle_configuration_rulesto be fully defined with optional members
why
- Avoid situation where module fails because auto-generated bucket name is too long
- Make it easier to build a list of rules
references
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html
- https://github.com/cloudposse/terraform-aws-s3-bucket/issues/167
v1.2.0: Support new AWS S3 defaults (ACL prohibited)
π€ Automatic Updates
Update Terraform cloudposse/s3-bucket/aws to v3.1.0 @ββ8203;renovate (#β8203;85)
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| cloudposse/s3-bucket/aws (source) | module | minor | 3.0.0 -> 3.1.0 |
Release Notes
cloudposse/terraform-aws-s3-bucket
v3.1.0
Make compatible with new S3 defaults. Add user permissions boundary. @ββ8203;β8203;8203;Nuru (#β8203;8203;178)
what
- Make compatible with new S3 defaults by setting S3 Object Ownership before setting ACL and disabling ACL if Ownership is "BucketOwnerEnforced"
- Add optional permissions boundary input for IAM user created by this module
- Create
aws_s3_bucket_accelerate_configurationandaws_s3_bucket_versioningresources even when the feature is disabled, to enable drift detection
why
- S3 buckets with ACLs were failing to be provisioned because the ACL was set before the bucket ownership was changed
- Requested feature
- See #β171
references
Always include `aws_s3_bucket_versioning` resource @ββ8203;β8203;8203;mviamari (#β8203;8203;172)
what
- Always create an
aws_s3_bucket_versioningresource to track changes made to bucket versioning configuration
why
- When there is no
aws_s3_bucket_versioning, the expectation is that the bucket versioning is disabled/suspend for the bucket. If bucket versioning is turned on outside of terraform (e.g. through the console), the change is not detected by terraform unless theaws_s3_bucket_versioningresource exists.
references
- Closes #β171
Add support for permission boundaries on replication IAM role @ββ8203;β8203;8203;mchristopher (#β8203;8203;170)
what
- Adds support for assigning permission boundaries to the replication IAM role
why
- Our AWS environment enforces permission boundaries on all IAM roles to follow AWS best practices with security.
references
π€ Automatic Updates
Update README.md and docs @ββ8203;β8203;8203;cloudpossebot (#β8203;8203;164)
what
This is an auto-generated PR that updates the README.md and docs
why
To have most recent changes of README.md and doc from origin templates
v0.40.0: Update dependencies
π Enhancements
notes
- Terraform minimum version is now 1.1.0
- AWS provider minimum version is now 4.9.0
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| cloudposse/s3-log-storage/aws (source) | module | major | 0.26.0 -> 1.1.0 |
Release Notes
cloudposse/terraform-aws-s3-log-storage
v1.1.0
Adding "object_lock_configuration" variable @ββ8203;ramses999 (#β8203;84)
what
Adding "object_lock_configuration" variable which is used in module "cloudposse/s3-bucket/aws"
why
Must be able to use the Object Lock option for S3 in this module
references
https://github.com/cloudposse/terraform-aws-s3-bucket/blob/6837ed7b2f2460043d6be3981f16ed90563fd12a/main.tf#L5
v1.0.0
Important Notes
- Terraform version 1.3.0 and Terraform AWS version 4.9.0 or later are required
- The new
bucket_key_enabledflag defaults tofalsefor backward compatibility. At one point we recommend setting it to true for significant savings on KMS usage, but since bucket keys are only reused within a user session, it is not clear if it provides any savings at all. See AWS docs for more information. - The new
lifecycle_configuration_rulesinput replaces the now deprecated individual inputs for individual settings of a single lifecycle rule. See the terraform-aws-s3-bucket documentation for details on how to specify lifecycles usinglifecycle_configuration_rules. This mechanism is much more flexible and closely follows the Terraformaws_s3_bucket_lifecycle_configurationresource. - The new
source_policy_documentsinput replaces the now deprecatedpolicyinput to match changes to theaws_iam_policy_documentresource - You can now select default values for (non-deprecated) inputs by setting them to
null - With Terraform 1.3 the manual interventions documented for upgrading to this module's versions 0.27.0 and 0.28.0 are no longer needed. You can safely upgrade from any earlier version to this one (although we always recommend leaving
force_destroyat its default value offalse, and if you have it set totruebut want extra safety against the S3 bucket being destroyed, set it tofalsebefore upgrading). - The
force_destroy_enabledflag introduced in v0.27.0 has been removed - In version 0.28.0, old lifecycle rule variables were deprecated and the new
lifecycle_configuration_rulesinput was introduced. In that version, you would continue to get the old default lifecycle rule even if you supplied new rules vialifecycle_configuration_rules. Now, the default behavior is to ignore all the deprecated lifecycle inputs when thelifecycle_configuration_rulesinput is not empty, unless you explicitly setlifecycle_rule_enabledto true.
Enhancements
Automate upgrade using `moved` blocks @ββ8203;Nuru (#β8203;81)
what
- Automate the upgrade process from v0.26.0 or earlier by using
movedblock functionality introduced in Terraform 1.3.0 - Add
nullable = falsefor module input variables which have a default value and where null is not a sensible/handled value for the variable.
why
- Safely upgrade without loss of data or manual intervention
- Allow users to select default values by setting inputs to
null, closes #β63
v0.28.3: Not recommended, use v0.26.0 or v1.x instead
Update: This version no longer recommended
With the release of version 1.0.0 of this module, use of this version is no longer recommended. When you are able to use Terraform v1.3.0 or later and Terraform AWS provider v4.9.0 or later, upgrade directly to v1.0.0 or later of this module.
π€ Automatic Updates
Update Terraform cloudposse/s3-bucket/aws to v3 @ββ8203;renovate (#β8203;78)
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| cloudposse/s3-bucket/aws (source) | module | major | 2.0.1 -> 3.0.0 |
v0.28.2: Action required if updating from prior to v0.28.0
Update: This version no longer recommended
With the release of version 1.0.0 of this module, use of this version is no longer recommended. When you are able to use Terraform v1.3.0 or later and Terraform AWS provider v4.9.0 or later, upgrade directly to v1.0.0 or later of this module.
v0.28.0 introduced breaking changes with high risk of permanent data loss. See release notes there. This is only a safe upgrade if upgrading from v0.28.0.
We will convert to semantic versioning (incrementing the major version number for breaking changes), but having missed the opportunity to do that for earlier versions of this module, we are waiting for the next major change, expected to be soon after Terraform v1.3 is released.
π€ Automatic Updates
Update Terraform cloudposse/s3-bucket/aws to v2.0.1 @ββ8203;renovate (#β8203;76)
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| cloudposse/s3-bucket/aws (source) | module | patch | 2.0.0 -> 2.0.1 |
v0.28.1: accidental release, do not use
v0.28.0 introduced breaking changes with high risk of permanent data loss. See release notes there. This is only a safe upgrade if upgrading from v0.28.0.
We will convert to semantic versioning (incrementing the major version number for breaking changes), but having missed the opportunity to do that for earlier versions of this module, we are waiting for the next major change, expected to be soon after Terraform v1.3 is released.
git.io->cloudposse.tools update @ββ8203;dylanbannon (#β8203;73)
what and why
Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.
References
- DEV-143
π€ Automatic Updates
Update Terraform cloudposse/s3-bucket/aws to v2 @ββ8203;renovate (#β8203;72)
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| cloudposse/s3-bucket/aws (source) | module | major | 0.49.0 -> 2.0.3 |
v0.28.0: (Action Needed) Support AWS v4 provider
WARNING, DATA LOSS LIKELY if you do not follow upgrade instructions:
- Upgrade instructions: v0.27.0 to v0.28.0
- Upgrade instructions: versions prior to v0.27.0 to v0.27.0
π Enhancements
Support AWS v4 provider @ββ8203;Nuru (#β8203;71)
what
- Migrate to AWS v4 Terraform provider
- Add features
- Allow full S3 storage lifecycle configuration
- Allow multiple bucket policy documents
- Allow specifying the bucket name directly, rather than requiring it to be generated by
null-label - Allow specifying S3 object ownership
- Allow enabling S3 bucket keys for encryption
- Deprecate variable by variable specification of a single storage lifecycle rule
- Add extra safety measure
force_destroy_enabled
why
- AWS v4 broke this module
- Feature parity
- Replaced with more power and more flexible input
- Reduce the chance that automated upgrades will cause data loss
references
- Upgrade instructions: v0.27.0 to v0.28.0
- Upgrade instructions: versions prior to v0.27.0 to v0.27.0
v0.27.0: (WARNING: Potential Data Loss) Prepare for AWS provider v4
Update: This version no longer recommended
With the release of version 1.0.0 of this module, use of this version is no longer recommended. When you are able to use Terraform v1.3.0 or later and Terraform AWS provider v4.9.0 or later, upgrade directly to v1.0.0 or later of this module.
Warning: Potential total data loss
This release is a refactoring in preparation for supporting Terraform AWS Provider v4. One feature was removed, but otherwise there are no changes to inputs or behavior. However, the Terraform "addresses" of resources have changed, so you are need to run several terraform state mv commands.
Warning: failure to run the required terraform state mv commands will cause Terraform to delete your existing S3 bucket and create a new one, deleting all the data stored in the bucket in the process.
Details on how to safely upgrade are in this repository's Wiki here
Support for "MFA delete" removed
In #β54 a contributor added support for MFA delete via the versioning_mfa_delete_enabled. In AWS provider version 3.x this argument was documented with the caveat
This cannot be used to toggle this setting but is available to allow managed buckets to reflect the state in AWS.
With AWS provider version 4.0, this argument now does toggle the setting. Unfortunately, that adds the requirement then when it is enabled, you must supply a current MFA token every time you run terraform apply. That is not compatible with automation, and therefore we have no intention to support it and have removed the versioning_mfa_delete_enabled input.
π Enhancements
Refactor to use s3-bucket module, update in general @ββ8203;Nuru (#β8203;66)
what
- Refactor to use terraform-aws-s3-bucket
- Remove support for
mfa_delete - Pin AWS provider
< 4.0and disable Renovate bot, closes #&#β8203;64 - General updates
why
- Simplify maintenance and standardize on single S3 bucket module, in preparation for upgrade to Terraform AWS provider v4
- With Terraform AWS provider v4, having
mfa_deleteenabled requires entering an MFA token for every Terraform operation, which is incompatible with automation. Users requiringmfa_deleteshould either not use Terraform or create their own fork. - Current module does not work with AWS v4, but Renovate would try to update it anyway
- Stay current with boilerplate and management tools
notes
This is the first of 2 upgrade releases to get this module to support Terraform AWS Provider v4. We are breaking it into 2 releases so that users have the option of upgrading step-by-step rather than all at once. Upgrade instructions are here.
Cleanups and safety checks for upgrade @ββ8203;Nuru (#β8203;70)
what
- Add warning to README and error when
force_destroyistrue - Maintain rule name for lifecycle rule
- Disable Renovate bot
why
- If
force_destroyistruethen an automated, unattended process could cause the S3 bucket to be deleted and all data in it irretrievably lost - Remove an unwanted and unneeded source of changes created by upgrading
- This version should not be updated, it is pinned for compability
references
Closes Renovate PRs:
v0.39.0
Adding support for setting permissions boundary on IAM-role @βjannyg (#β117)
This is my first PR to Cloudposse projects. Thanks for all the good contributions and please let me know if there's any adjustments needed.
what
- This will add support for setting a permission boundary for the IAM role
- This is needed for master payer accounts through resellers that restricts access to the master payer accunt.
- The value is optional
why
- This is needed for master payer accounts through resellers that restricts access to the master payer account and require the permissions boundary to be set on all new IAM roles to restrict access to certain resources.
references
- AWS documentation: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
- https://registry.terraform.io/providers/hashicorp/aws%20%20/latest/docs/resources/iam_role#permissions_boundary
Do not auto-publish from release branches @βNuru (#β127)
what
- Do not auto-publish from release branches
why
- When
release-drafterauto-publishes, it sets the release as "latest", which is not what we want for updates to release branches.
Update workflows and other framework @βNuru (#β126)
what
- Update workflows and other framework to current versions
why
- Add support for release branches
git.io->cloudposse.tools and test fixes @βdylanbannon (#β116)
what and why
Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.
References
- DEV-143
Configuration
π Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
π¦ Automerge: Disabled by config. Please merge this manually once you are satisfied.
β» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
π Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, check this box
This PR has been generated by Mend Renovate. View repository job log here.
The latest updates on your projects. Learn more about Vercel for Git βοΈ
| Name | Status | Preview | Comments | Updated (UTC) |
|---|---|---|---|---|
| tf-free | β Failed (Inspect) | May 31, 2023 1:58am |
Edited/Blocked Notification
Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.
You can manually request rebase by checking the rebase/retry box above.
β οΈ Warning: custom changes will be lost.