Skip to main content

Gruntwork release 2017-11

Guides / Update Guides / Releases / 2017-11

This page is lists all the updates to the Gruntwork Infrastructure as Code Library that were released in 2017-11. For instructions on how to use these updates in your code, check out the updating documentation.

Here are the repos that were updated:

gruntwork

v0.0.8

Published: 11/28/2017 | Release notes

https://github.com/gruntwork-io/gruntwork/pull/8: Show better instructions after TLS certs have been requested.

v0.0.7

Published: 11/28/2017 | Release notes

https://github.com/gruntwork-io/gruntwork/pull/7: You can now use gruntwork to request free TLS certs from ACM for your domain names.

v0.0.6

Published: 11/27/2017 | Release notes

https://github.com/gruntwork-io/gruntwork/pull/6: The gruntwork CLI can now register domain names for use with the Reference Architecture.

v0.0.5

Published: 11/24/2017 | Release notes

https://github.com/gruntwork-io/gruntwork/pull/5: When looking up accounts by name, gruntwork will now detect if multiple accounts have the same name and prompt the user to pick one.

v0.0.4

Published: 11/22/2017 | Release notes

https://github.com/gruntwork-io/gruntwork/pull/4: Update the docs and CLI to indicate BitBucket and GitLab are not yet supported.

v0.0.3

Published: 11/21/2017 | Release notes

https://github.com/gruntwork-io/gruntwork/pull/3: Switch to managed policies instead of custom ones.

v0.0.2

Published: 11/21/2017 | Release notes

https://github.com/gruntwork-io/gruntwork/pull/2: Users can now choose to give Gruntwork employees either admin or read-only access. MFA is now required for Gruntwork employees. Fix a bug with revoking access.

v0.0.1

Published: 11/17/2017 | Release notes

terraform-aws-cache

v0.3.2

Published: 11/29/2017 | Release notes

https://github.com/gruntwork-io/module-cache/pull/12: You can now specify custom tags for your Redis and cluster and security group.

v0.3.1

Published: 11/29/2017 | Release notes

https://github.com/gruntwork-io/module-cache/pull/14: Put in a workaround for a bug in Terraform (https://github.com/terraform-providers/terraform-provider-aws/issues/2468) related to parameter_group_name always showing a diff when you run plan and causing errors when you run apply.

terraform-aws-ci

v0.5.0

Published: 11/30/2017 | Release notes

v0.4.1

Published: 11/28/2017 | Release notes

v0.4.0

Published: 11/7/2017 | Release notes

https://github.com/gruntwork-io/module-ci/pull/43: The gruntwork-module-circleci-helpers now support using dep instead of Glide for Go dependency management. You can enable this by passing the --use-go-dep flag to configure-environment-for-gruntwork-module. These changes should be backwards compatible, but we now install Go 1.9.2 by default, so marking this release as v0.4.0 just in case.

terraform-aws-data-storage

v0.4.0

Published: 11/29/2017 | Release notes

v0.3.2

Published: 11/29/2017 | Release notes

https://github.com/gruntwork-io/module-data-storage/pull/29: Put in a workaround for a bug in Terraform (https://github.com/terraform-providers/terraform-provider-aws/issues/2468) related to parameter_group_name always showing a diff when you run plan and causing errors when you run apply.

v0.3.1

Published: 11/2/2017 | Release notes

https://github.com/gruntwork-io/module-data-storage/pull/28: The aurora module now exposes engine and engine_version parameters so you have more control over what type of Aurora engine you're running (e.g., you can use the Postgres-compatible one).

terraform-aws-load-balancer

v0.7.0

Published: 11/20/2017 | Release notes

https://github.com/gruntwork-io/module-load-balancer/pull/20: We've converted the https_listener_ports_and_ssl_certs and https_listener_ports_and_acm_ssl_certs input variables on the alb module from maps to lists of maps. The problem with using maps is that in Go—which Terraform uses under the hood—the iteration order for maps is (intentionally) randomized, so with multiple ports and certs in these variables, you would get spurious diffs in the plan command as Terraform would swap their order and assume listeners had to created/destroyed. By using lists, we can make the sort order consistent.

Upgrade instructions for https_listener_ports_and_ssl_certs

Old https_listener_ports_and_ssl_certs format:

https_listener_ports_and_ssl_certs = {
"443" = "arn:aws:iam::123456789012:server-certificate/ProdServerCert"
}

New https_listener_ports_and_ssl_certs format:

https_listener_ports_and_ssl_certs = [
{
port = 443
tls_arn = "arn:aws:iam::123456789012:server-certificate/ProdServerCert"
}
]

Upgrade instructions for https_listener_ports_and_acm_ssl_certs

Old https_listener_ports_and_acm_ssl_certs format:

https_listener_ports_and_acm_ssl_certs = {
"443" = "*.foo.com"
}

New https_listener_ports_and_acm_ssl_certs format:

https_listener_ports_and_acm_ssl_certs = [
{
port = 443
tls_domain_name = "*.foo.com"
}
]

terraform-aws-mongodb

v0.2.5

Published: 11/30/2017 | Release notes

https://github.com/gruntwork-io/package-mongodb/pull/24: If you set the cluster_size param of the mongodb-cluster module to 0, it will now create no resources whatsoever. Since Terraform doesn't allow you to use count with module directly, this provides a convenient way to disable the mongodb-cluster module in certain environments (e.g., disable the backup jobs in pre-prod environments).

v0.2.4

Published: 11/30/2017 | Release notes

https://github.com/gruntwork-io/package-mongodb/pull/23: Undo pip workaround so that Packer builds pass again.

terraform-aws-security

v0.6.6

Published: 11/29/2017 | Release notes

v0.6.5

Published: 11/8/2017 | Release notes

  • #60: The aws-auth tool will now work correctly, even if a local user has configured AWS CLI commands to output in tables instead of JSON.

v0.6.4

Published: 11/7/2017 | Release notes

https://github.com/gruntwork-io/module-security/pull/59: ssh-iam will now do a better job of reporting error messages if it reads an OS user that is missing the "comment field", which ssh-iam uses for storing the IAM user name.

v0.6.3

Published: 11/6/2017 | Release notes

https://github.com/gruntwork-io/module-security/pull/52:

  1. You can now disable the full-access IAM group in the iam-groups module using the should_create_iam_group_full_access parameter.

  2. The iam-groups module now outputs the ARNs and names of the ssh-iam groups.

terraform-aws-vpc

v0.3.2

Published: 11/3/2017 | Release notes

https://github.com/gruntwork-io/module-vpc/pull/33: Add output for private persistence subnet with proper naming convention.

v0.3.1

Published: 11/2/2017 | Release notes

https://github.com/gruntwork-io/module-vpc/pull/30: Added VPC endpoints for DynamoDB, so all your DynamoDB calls now stay within the VPC rather than going over the public Internet.