Gruntwork release 2022-07
Guides / Update Guides / Releases / 2022-07
This page is lists all the updates to the Gruntwork Infrastructure as Code
Library that were released in 2022-07. For instructions
on how to use these updates in your code, check out the updating
documentation.
Here are the repos that were updated:
Published: 7/19/2022 | Release notes
Published: 7/18/2022 | Release notes
Published: 7/11/2022 | Release notes
- Fixed bug where boilerplate preferred the variable defaults defined in the
variables
field of the dependency
object over the var file values, unlike what was implied by the documentation.
This release has two intentional behavior changes:
boilerplate
will now prefer values specified in var_files
on the dependency
over the default
value of variables
.
boilerplate
will no longer ask for variables specified on dependency
in interactive mode.
boilerplate
no longer supports bare variable definitions on dependency
config (that is, you must specify a default
or reference
when adding a variable to the variables
list on a dependency
config.
If you were relying on either of these behaviors, please file a GitHub issue with your use case so we can discuss alternatives.
Published: 7/11/2022 | Modules affected: server-group | Release notes
- Fixes attachment of security groups in the
server-group
module when using both the option to create ENIs and externally attaching additional security groups.
Published: 7/13/2022 | Modules affected: ecs-deploy-runner | Release notes
- Updated
ecs-deploy-runner
to support tagging of multiple images
Published: 7/6/2022 | Release notes
- Fixed bug in upgrade testing module find and replace where it matched modules with the same prefix.
Published: 7/6/2022 | Modules affected: ecs-deploy-runner-standard-configuration, ecs-deploy-runner | Release notes
- Added option
--no-push
to docker-image-builder
to perform only building of container images and avoid pushing to registry.
Published: 7/5/2022 | Modules affected: ecs-deploy-runner | Release notes
- Updated refs for
terraform-aws-ci
in Dockerfiles for ecs-deploy-runner
.
- Added patch testing on PRs within the upgrade test runner.
Published: 7/18/2022 | Modules affected: steampipe-runner | Release notes
Published: 7/15/2022 | Modules affected: steampipe-runner, ecs-deploy-runner-steampipe-standard-configuration | Release notes
Published: 7/6/2022 | Modules affected: steampipe-runner, ecs-deploy-runner-with-steampipe-runner, ecs-deploy-runner-steampipe-standard-configuration | Release notes
-
steampipe-runner
-
ecs-deploy-runner-with-steampipe-runner
-
ecs-deploy-runner-steampipe-standard-configuration
-
Updated the underlying go dependency versions of the run-steampipe-mod-check
trigger command for the steampipe-runner
.
-
Fixed bug where --publish-to-securityhub
did not work due to security token failures when running in the ECS Deploy Runner.
-
Added new option --report-global-to-region
which allows publishing global findings (e.g., issues with IAM) to Security Hub in the specified region.
https://github.com/gruntwork-io/terraform-aws-ci-steampipe/pull/28
Published: 7/28/2022 | Modules affected: observability/cloudwatch-logs-metric-filters, observability/aws-config-multi-region, landingzone/account-baseline-app, landingzone/account-baseline-root | Release notes
- Updated dependencies:
terraform-aws-monitoring
: v0.35.1
to v0.35.2
terraform-aws-service-catalog
: v0.93.0
to v0.93.1
terraform-aws-lambda
: v0.20.0
to v0.20.1
- Lambda python runtime:
3.7
to 3.9
- Updated test dependencies.
Published: 7/27/2022 | Modules affected: landingzone/account-baseline-app, landingzone/account-baseline-root, landingzone/account-baseline-security, observability/aws-config-multi-region | Release notes
- Exposed flag
enable_root_account_mfa_rule
for AWS Config to allow disabling the root user MFA AWS Config rule. This should only be turned off for AWS partitions that do not support a root user (e.g., GovCloud).
Published: 7/27/2022 | Modules affected: security/aws-securityhub, landingzone/account-baseline-app, landingzone/account-baseline-security, landingzone/account-baseline-root | Release notes
- Updated hardcoded ARNs to lookup AWS partition information to support deployment into alternative partitions such as GovCloud.
- Update dependencies:
terraform-aws-service-catalog
: v0.90.7
=> v0.93.0
terraform-aws-security
: v0.64.7
=> v0.65.8
- Test Golang dependencies
- CLI Golang dependencies for
codegen
library
Published: 7/21/2022 | Modules affected: landingzone/account-baseline-app, landingzone/account-baseline-root, landingzone/account-baseline-security, observability/cloudtrail | Release notes
- Exposed the ability to configure cross account SNS Topic access. You can use the new
cloudtrail_benchmark_alarm_external_aws_account_ids_with_publish_access
and cloudtrail_benchmark_alarm_external_iam_entities_with_list_subscription_access
input variables to configure cross account access for various scenarios.
Published: 7/15/2022 | Modules affected: observability/cloudwatch-logs-metric-filters, observability/cloudtrail, landingzone/account-baseline-app, landingzone/account-baseline-security | Release notes
- Updated
cloudtrail
to configure object level data logging for ALL S3 buckets, not just the CloudTrail bucket. Previously the compliance requirement 3.10 and 3.11 was misinterpreted to mean only the CloudTrail bucket when in reality all S3 buckets in the account required to be monitored.
- Exposed the
additional_data_logging_resources
input variable in the account-baseline
modules to configure additional data logging resources on the CloudTrail instance.
- Added the ability to configure AWS Organizations metric filters in child accounts. While these are not strictly necessary, configuring them may be useful for satisfying various automated checks for CIS.
- Fixed bug where the CloudTrail metric filter SNS topics were not being encrypted with the CloudTrail KMS Key as originally intended.
Published: 7/13/2022 | Modules affected: landingzone/account-baseline-app, landingzone/account-baseline-root, landingzone/account-baseline-security, observability/cloudtrail | Release notes
- Added the ability to configure a subscription to the SNS Topic for CloudTrail CIS benchmark alarms that sends the alerts to a Slack Channel.
Published: 7/11/2022 | Modules affected: landingzone/account-baseline-root, landingzone/account-baseline-security, landingzone/account-baseline-app, security/cleanup-expired-certs | Release notes
- Updated the AWS Config Aggregator to force to aggregating all regions. This is due to the CIS control 3.5 that requires AWS Config be enabled in all regions, so it makes sense to always require aggregating all regions.
- Updated dependencies:
terraform-aws-lambda
: v0.19.3
to v0.20.0
terraform-aws-security
: v0.65.6
to v0.65.7
Published: 7/7/2022 | Modules affected: networking/vpc-mgmt, networking/vpc-mgmt-network-acls, networking/vpc, networking/vpc-app-network-acls | Release notes
- Fixed a CIS Compliance misinterpretation for control 5.1 (VPC NACLs). Control 5.1 states
Ensure no Network ACLs allow ingress from
0.0.0.0/0 to remote server administration ports
, which was originally interpreted to mean that there should be no network ACL that effectively allows ingress from 0.0.0.0/0
on admin ports, but the popular interpretation is that there should be no network ACL rule that allows ingress from 0.0.0.0/0
, even if a higher priority rule explicitly denies access. As such, starting this release, the network ACL rules are adjusted to ensure that no rule allows ingress from 0.0.0.0/0
in all rules configured.
Published: 7/7/2022 | Modules affected: landingzone/account-baseline-root, landingzone/account-baseline-security, landingzone/account-baseline-app, security/aws-securityhub | Release notes
- Added the ability to configure an aggregator region to roll up the findings to in Security Hub. Note that only administrator accounts can designate an aggregator region.
Published: 7/5/2022 | Modules affected: networking/vpc, networking/vpc-mgmt | Release notes
- Added the ability to disable private SSH and RDP access at the NACL level, using the new
enable_administrative_remote_access_private_subnets_from_self
(for mgmt VPC), enable_administrative_remote_access_private_app_subnets_from_self
and enable_administrative_remote_access_private_persistence_subnets_from_self
(for app VPC) variables.
- Added the ability to configure the remote administrative ports for the NACLs from the VPC layer using the new
remote_administrative_ports
variable.
Published: 7/1/2022 | Modules affected: landingzone/account-baseline-security | Release notes
- Exposed the ability to configure
max_password_age
and password hard_expiry
for the IAM Password Policy from account-baseline-security
.
Published: 7/21/2022 | Modules affected: aurora | Release notes
- Fixed bug where
aurora
module could not be configured with a restore_to_time
setting due to mutual exclusivity.
Published: 7/19/2022 | Modules affected: rds | Release notes
- Added the ability to configure the character sets for the RDS Database for Oracle and MSSQL types.
Published: 7/5/2022 | Modules affected: aurora, backup-plan, backup-vault, efs | Release notes
- Unlock AWS provider v4. Require minimum 3.75.1. This update includes a few tests that make sure upgrading to this module from the last release is easy. However, you may need to bump your AWS provider version. See the migration guide notes below for more.
- Fixed a perpetual diff problem in
examples/rds-mysql-with-cross-region-replica
. If you've used this example, you've probably already noticed this in your own code when re-running apply. We've updated the example to include the var.storage_encrypted
setting in all example code that references the modules/rds
module.
- Uncovered an undocumented (as of this release) backward incompatibility in the AWS Provider v4 upgrade from v3.75. We've handled this within the
modules/rds
logic so you don't have to update your code.
Published: 7/28/2022 | Modules affected: run-lambda-entrypoint | Release notes
- Added the ability to configure multiple secrets manager entries for container based Lambda functions in the
run-lambda-entrypoint
command.
Published: 7/18/2022 | Modules affected: lambda | Release notes
- Add patch that automates upgrading from
v0.16.x
to v0.17.0
.
- Adds
tracing_config
variable
- Update
aws_arn data
call to use data partition
Published: 7/7/2022 | Modules affected: api-gateway-account-settings, api-gateway-proxy-methods, api-gateway-proxy, keep-warm | Release notes
- Unlock AWS provider v4. Require minimum 3.75.1. This update includes a few tests that make sure upgrading to this module from the last release is easy. However, you may need to bump your AWS provider version. See the migration guide notes below for more info.
- Internal updates:
- Updated code owners
- Added upgrade testing
- Patches added:
Published: 7/27/2022 | Modules affected: alarms | Release notes
- Add variable to configure how to treat missing data for Memcached and Redis alarms
Published: 7/21/2022 | Modules affected: logs/cloudwatch-logs-metric-filters | Release notes
- Added the ability to configure the SNS Topic with cross account access for publish and list subscriptions.
Published: 7/12/2022 | Modules affected: alarms/sns-to-slack | Release notes
- Updated
sns-to-slack
module to require passing through the Slack webhook URL using AWS Secrets Manager instead of directly as module variables. This is to treat the webhook URL more like a Secret as recommended by Slack.
Published: 7/11/2022 | Modules affected: ssh-grunt | Release notes
- Updated Go dependencies of
ssh-grunt
and codegen
utilities. There are no updates to the functionality of the CLI tools.
Published: 7/7/2022 | Modules affected: aws-config-multi-region, aws-config | Release notes
- Added partial support for deploying AWS Config in previously unsupported region
ap-northeast-3
.
Published: 7/21/2022 | Modules affected: ec2-backup | Release notes
- Replaces hardcoded IAM arn with a data source, for compatibility with multiple partitions
Published: 7/15/2022 | Modules affected: single-server | Release notes
- Fixes bug where IAM roles that were created through the AWS console could not be passed to the
single-server
module because of duplicate instance profile. Allows disabling the creation of instance profile internally inside the module.
Published: 7/28/2022 | Modules affected: landingzone/account-baseline-app, landingzone/account-baseline-root, landingzone/account-baseline-security | Release notes
- Unlock AWS provider v4. Require minimum 3.75.1 just for Landing Zone modules. This update includes a few tests that make sure upgrading to this module from the last release is easy. However, you may need to bump your AWS provider version. See the migration guide notes below for more info.
Published: 7/28/2022 | Modules affected: base/ec2-baseline, services/ec2-instance, mgmt/jenkins, mgmt/bastion-host | Release notes
- Exposed the ability to specify tags on
ecs-cluster
resources.
- Updated ARN references to dynamically look up the AWS partition information to support alternative partitions.
- Updated dependencies:
terraform-aws-security
: v0.65.6
=> v0.65.8
- Default version of
terraform
in jenkins
: v1.2.3
=> v1.2.4
- Updated test dependencies.
Published: 7/27/2022 | Modules affected: data-stores/aurora, data-stores/rds, data-stores/ecr-repos, mgmt/tailscale-subnet-router | Release notes
- Added documentation for a hidden parameter
lifecycle_policy_rules
for ECR Repos.
- Added documentation for a hidden parameter
taints
for Managed Node Groups.
- Added support for specifying a custom security group name for RDS and ECS Services.
- Added support for configuring performance insights on Aurora.
- Updated dependencies:
terraform-aws-asg
terraform-aws-lambda
terraform-aws-data-storage
terraform-aws-vpc
terraform-aws-ci
Published: 7/26/2022 | Modules affected: s3-cloudfront, s3-static-website | Release notes
- Added support for associating CloudFront functions with the CloudFront distribution managed with the
s3-cloudfront
module.
- Updated the website S3 bucket with additional security configurations when operating in private bucket mode:
- The bucket will now configure blocking of public access for the objects.
- The bucket will now enforce encryption of data in transit (only accessible over TLS).
Published: 7/25/2022 | Modules affected: s3-cloudfront | Release notes
- Adds
cloudfront_distribution_domain_name
as output var
Published: 7/7/2022 | Modules affected: network-acl-inbound, network-acl-outbound, port-range-calculator, vpc-app-network-acls | Release notes
- Added a new input variable
exclude_ports_from_inbound_all
that can be used to exclude a list of ports from the inbound global CIDR rules in the network acl modules. This is useful for adhering to certain compliance standards like CIS that explicitly deny any allow rule for administrative ports.
Published: 7/7/2022 | Modules affected: vpc-flow-logs | Release notes
- Removed the
log:CreateLogGroup
permissions from the VPC Flow Logs. This was unnecessary as the Log Groups are managed in Terraform, and in fact can lead to a race condition where the Log Group gets recreated after deletion.