Gruntwork release 2017-09
Guides / Update Guides / Releases / 2017-09
This page is lists all the updates to the Gruntwork Infrastructure as Code
Library that were released in 2017-09. For instructions
on how to use these updates in your code, check out the updating
documentation.
Here are the repos that were updated:
Published: 9/30/2017 | Release notes
Published: 9/29/2017 | Release notes
https://github.com/gruntwork-io/module-asg/pull/10: The server-group
module now assigns EBS permissions based on the ServerGroupName
tag instead of the Name
tag, as the latter is too brittle. This change is backwards incompatible, so we're bumping the patch version number, but unless you are doing something weird and overriding ServerGroupName
(very unlikely!), you shouldn't have to do anything to make this work with your code.
Published: 9/21/2017 | Release notes
#35: Fix a bug where we were using high_read_latency_threshold
instead of high_write_latency_threshold
on the rds_high_write_latency
aws_cloudwatch_metric_alarm.
Published: 9/15/2017 | Release notes
- BUG FIX/#34: The Target Group alarm
tg_high_http_code_target_4xx_count
was previously using variables meant for tg_high_http_code_target_5xx_count
. This has now been fixed.
Published: 9/24/2017 | Release notes
Published: 9/12/2017 | Release notes
Published: 9/7/2017 | Release notes
https://github.com/gruntwork-io/module-security/pull/45
BACKWARDS INCOMPATIBLE CHANGE
The iam_groups_for_cross_account_access
input parameter of the iam-groups
module is now a list of maps rather than a map. This keeps the order of groups more constant when you add groups, rather than trying to delete and recreate all the old groups (note that if you remove a group, the order will still change, which is an unfortunate Terraform limitation: https://github.com/hashicorp/terraform/issues/14275).
To use the new version of the iam-groups
module, instead of specifying a map:
iam_groups_for_cross_account_access = &
"stage-full-access": "arn:aws:iam::123445678910:role/mgmt-full-access",
"prod-read-only-access": "arn:aws:iam::9876543210:role/prod-read-only-access"
&
You need to specify a list of maps:
iam_groups_for_cross_account_access = [
&
group_name = "stage-full-access"
iam_role_arn = "arn:aws:iam::123445678910:role/mgmt-full-access"
&
&
group_name = "prod-read-only-access"
iam_role_arn = "arn:aws:iam::9876543210:role/prod-read-only-access"
&
]
Published: 9/25/2017 | Release notes
https://github.com/gruntwork-io/module-server/pull/18: The attach-eni
script will now automatically configure route tables on Debian servers. This should allow ENIs to work "automagically" just like they do on Amazon Linux. This release is backwards compatible from an API perspective, but we've bumped the minor version number to indicate that it's a fairly large change in terms of behavior.
Published: 9/11/2017 | Release notes
https://github.com/gruntwork-io/module-server/pull/17: The single-server
module now exposes security_group_name
and iam_group_name
parameters that let you customize the security group and IAM group names, respectively. The default uses the name
input as before, so this is a backwards compatible change.
Published: 9/20/2017 | Release notes
BACKWARDS INCOMPATIBLE CHANGE
https://github.com/gruntwork-io/package-static-assets/pull/3: The s3-cloudfront
module now allows you to use multiple domain names with your CloudFront distribution. To support this, the following parameters have been renamed:
- Input:
create_route53_entry
-> create_route53_entries
- Input:
domain_name
-> domain_names
and is now a list
- Output:
cloudfront_domain_name
-> cloudfront_domain_names
and is now a list