Skip to content
This repository has been archived by the owner on Jan 25, 2023. It is now read-only.

Releases: hashicorp/terraform-aws-vault

v0.17.0

18 Aug 08:15
350b705
Compare
Choose a tag to compare

Description

  • Terraform 1.0 upgrade: We have verified that this repo is compatible with Terraform 1.0.x!
    • From this release onward, we will only be running tests with Terraform 1.0.x against this repo, so we recommend updating to 1.0.x soon!
    • To give you more time to upgrade, for the time being, all modules will still support Terraform 0.15.1 and above, as that version has several features in it (required_providers with source URLs) that make it more forwards compatible with 1.0.x.

Related links

v0.16.0

25 May 12:27
effca07
Compare
Choose a tag to compare

Description

  • Terraform 0.15 upgrade: We have verified that this repo is compatible with Terraform 0.15.x!
    • From this release onward, we will only be running tests with Terraform 0.15.x against this repo, so we recommend updating to 0.15.x soon!
    • To give you more time to upgrade, for the time being, all modules will still support Terraform 0.12.26 and above, as that version has several features in it (required_providers with source URLs) that make it more forwards compatible with 0.15.x.
    • Once all Gruntwork repos have been upgrade to work with 0.15.x, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.

Related links

v0.15.1

12 Apr 16:18
0b7f606
Compare
Choose a tag to compare

Modules affected

  • install-vault

Description

  • You can now tell the install-vault skip calling apt-get update or yum update by passing the --skip-package-update flag.

Special thanks

  • Thank you to @queglay for the contribution!

Related links

v0.15.0

12 Apr 02:50
61db1c3
Compare
Choose a tag to compare

Modules affected

  • install-vault
  • private-tls-cert
  • run-vault
  • update-certificate-store
  • vault-cluster
  • vault-elb
  • vault-security-group-rules

Description

  • Terraform 0.14 upgrade: We have verified that this repo is compatible with Terraform 0.14.x!
    • From this release onward, we will only be running tests with Terraform 0.14.x against this repo, so we recommend updating to 0.14.x soon!
    • To give you more time to upgrade, for the time being, all modules will still support Terraform 0.12.26 and above, as that version has several features in it (required_providers with source URLs) that make it more forwards compatible with 0.14.x.
    • Once all Gruntwork repos have been upgrade to work with 0.14.x, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.

Related links

v0.14.3

08 Apr 09:09
2a67b66
Compare
Choose a tag to compare

Modules affected

  • vault-elb

Description

  • You can now enable access logging for the Vault ELB using the new access_logs input variable.

Special thanks

Related links

v0.14.2

16 Feb 11:13
f1ac700
Compare
Choose a tag to compare

Modules affected

  • run-vault

Description

  • When using a backend other than Consul, run-vault will now explicitly configure Vault to register itself as a service in Consul. Otherwise, if you're using some other backend, such as S3, service discovery won't work correctly. You can configure the Consul agent address to use for registration via the new --consul-agent-service-registration-address argument (the default is localhost:8500).
  • Updated the systemd config that run-vault sets up for Vault:
    • Configure reasonable defaults for StartLimitIntervalSec and StartLimitBurst so Vault doesn't infinitely try to restart in case of a permanent error.
    • Set LimitMEMLOCK to infinity to prevent memory from being swapped to disk.
  • We've updated the examples to use more modern versions:
    • Bump Vault to 1.6.1
    • Bump Consul to 1.9.2

Related links

v0.14.1

26 Jan 12:11
a0bc093
Compare
Choose a tag to compare

Modules affected

  • vault-cluster

Description

  • You can now configure a permissions boundary for the IAM role using the new iam_permissions_boundary input variable.

Special thanks

Related links

v0.14.0

20 Oct 11:18
372aae4
Compare
Choose a tag to compare

Modules affected

  • (none)

Description

  • Terraform 0.13 upgrade: We have verified that this repo is compatible with Terraform 0.13.x!
    • From this release onward, we will only be running tests with Terraform 0.13.x against this repo, so we recommend updating to 0.13.x soon!
    • To give you more time to upgrade, for the time being, all modules will still support Terraform 0.12.26 and above, as that version has several features in it (required_providers with source URLs) that make it more forwards compatible with 0.13.x.
    • Once all Gruntwork repos have been upgrade to work with 0.13.x, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.

Related links

v0.13.11

13 Sep 13:20
2995dc8
Compare
Choose a tag to compare

Modules affected

  • vault-cluster

Description

  • The vault-cluster module now sets the ignore_changes lifecycle setting on load_balancers and target_group_arns attributes. As of AWS Provider 3.x, if you use aws_autoscaling_attachment, you MUST have ignore_changes set on these attributes, or your load balancer will be removed (see corresponding issue in the AWS provider). Since the vault-cluster module doesn't let you use these attributes anyway, this should be a backwards compatible change that allows this module to work properly with a load balancer.

Special thanks

Related links

v0.13.10

11 Sep 07:21
f67f99a
Compare
Choose a tag to compare

Modules affected

  • vault-cluster

Description

  • The vault-cluster module now provides output variables with information about the IAM instance profile: iam_instance_profile_arn, iam_instance_profile_id, and iam_instance_profile_name.

Special thanks

Related links