Gruntwork release 2018-11
Guides / Update Guides / Releases / 2018-11
This page is lists all the updates to the Gruntwork Infrastructure as Code
Library that were released in 2018-11. For instructions
on how to use these updates in your code, check out the updating
documentation.
Here are the repos that were updated:
Published: 11/10/2018 | Release notes
https://github.com/gruntwork-io/gruntkms/pull/16: Update all dependency versions, including updating to the latest AWS Go SDK. This should ensure gruntkms
works with the latest AWS metadata endpoints, including the ECS Task metadata endpoints.
Published: 11/6/2018 | Release notes
Published: 11/6/2018 | Release notes
Published: 11/26/2018 | Modules affected: eks-vpc-tags | Release notes
This release contains implementations for the following modules:
-
eks-vpc-tags
: A module exporting common tags necessary for VPC resources in order to have a functional EKS environment. Refer to the updated eks-cluster
example for reference on how to use the tags exported by this module.
-
This release is not intended to be used in production, as core features of a production grade infrastructure is still missing. This is currently intended to be used for development and learning purposes so that you can plan out a migration to Gruntwork modules for managing EKS.
-
This release is not tested with windows. Please file any bugs/issues you run into on the issue tracker.
-
https://github.com/gruntwork-io/package-k8s/pull/28
Published: 11/23/2018 | Modules affected: eks-cluster-control-plane, eks-cluster-workers, eks-k8s-role-mapping, install-eks-aws-iam-authenticator | Release notes
eks-cluster-control-plane
eks-cluster-workers
eks-k8s-role-mapping
install-eks-aws-iam-authenticator
k8s-scripts
This initial release contains implementations for the following modules:
-
eks-cluster-control-plane
: Provision an EKS cluster resource with recommended IAM policies and security groups that can be extended.
-
eks-cluster-workers
: Provision a set of EC2 instances that EKS can use as worker nodes.
-
eks-k8s-role-mapping
: Map AWS IAM roles to Kubernetes RBAC roles to allow authentication and authorization to Kubernetes via AWS credentials.
-
install-eks-aws-iam-authenticator
: Prebuilt binaries for the AWS IAM Authenticator for Kubernetes that can be installed without a working golang environment. This binary is used to support authenticating to EKS by providing IAM roles to the EKS cluster's Kubernetes API.
-
k8s-scripts
: Helper scripts to configure kubectl
and helm
on the various flavors of Kubernetes clusters.
-
This initial release is not intended to be used in production, as core features of a production grade infrastructure is still missing. This is currently intended to be used for development and learning purposes so that you can plan out a migration to Gruntwork modules for managing EKS.
-
This initial release is not tested with windows. Please file any bugs/issues you run into on the issue tracker.
-
https://github.com/gruntwork-io/package-k8s/pull/11
Published: 11/22/2018 | Release notes
Some commit message. [go-test-args=-run SomeTestFunc]
The above commit message will only run SomeTestFunc
test function in the CI server after a push
Published: 11/22/2018 | Modules affected: aurora | Release notes
Published: 11/15/2018 | Release notes
To update your existing encryption enabled RDS cluster (which most likely uses serverless engine mode, else you'd have run into an error), simply run:
terragrunt state mv module.<module-name>.aws_rds_cluster.cluster_with_encryption module.<module-name>.aws_rds_cluster.cluster_with_encryption_serverless
Published: 11/7/2018 | Release notes
Published: 11/28/2018 | Modules affected: ecs-deploy-check-binaries | Release notes
-
ecs-deploy-check-binaries
-
Preliminary windows support for check-ecs-service-deployment
script by using python as opposed to bash for the entrypoint. Also rebuilds the binaries to include windows versions of the dependencies.
-
https://github.com/gruntwork-io/module-ecs/pull/99
Published: 11/23/2018 | Modules affected: ecs-deploy-check-binaries | Release notes
Published: 11/28/2018 | Modules affected: cross-account-iam-roles, iam-groups, iam-policies | Release notes
-
cross-account-iam-roles
-
iam-groups
-
iam-policies
-
The cross-account-iam
roles module now exposes an optional allow_houston_cli_access_from_other_account_arns
parameter that allows you to specify the ARNs of other AWS accounts that will be allowed to call the CLI endpoints in Gruntwork Houston.
-
The iam-groups
module now exposes an optional should_create_iam_group_houston_cli_users
parameter that, if set to true, will create an IAM Group with permissions that grants its users permissions to call the CLI endpoints in Gruntwork Houston.
-
The iam-policies
module now exposes an output called houston_cli_permissions
that creates the permissions necessary to call the CLI endpoints in Gruntwork Houston.
-
https://github.com/gruntwork-io/module-security/pull/121
Published: 11/11/2018 | Release notes
Published: 11/29/2018 | Modules affected: s3-cloudfront | Release notes
-
s3-cloudfront
-
The s3-cloudfront
module will now automatically create an AAAA
alias record (in addition to the A
record it always created) if is_ipv6_enabled
and create_route53_entries
are both set to true
. This is necessary so your static websites work over IPv6.
-
https://github.com/gruntwork-io/package-static-assets/pull/16
Published: 11/21/2018 | Modules affected: s3-static-website, s3-cloudfront | Release notes
s3-static-website
s3-cloudfront
You can now specify custom tags for all S3 buckets created by these modules using the new (optional) custom_tags
parameter.
Published: 11/12/2018 | Release notes