This repository has been archived by the owner on Jan 25, 2023. It is now read-only.
Releases: hashicorp/terraform-aws-consul
Releases · hashicorp/terraform-aws-consul
v0.8.3
v0.8.2
Modules affected
consul-cluster
consul-security-group-rules
Description
- You can now allow inbound API traffic on the HTTPS port by setting the new
enable_https_port
input variable totrue
. You can also customize the HTTPS port using the new input variablehttps_api_port
.
Special thanks
- Thank you to @Laakso for the contribution!
Related links
v0.8.1
v0.8.0
Modules affected
- (none)
Description
- Terraform 0.13 upgrade: We have verified that this repo is compatible with Terraform
0.13.x
!- From this release onward, we will only be running tests with Terraform
0.13.x
against this repo, so we recommend updating to0.13.x
soon! - To give you more time to upgrade, for the time being, all modules will still support Terraform 0.12.26 and above, as that version has several features in it (
required_providers
withsource
URLs) that make it more forwards compatible with0.13.x
. - Once all Gruntwork repos have been upgrade to work with
0.13.x
, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.
- From this release onward, we will only be running tests with Terraform
Related links
v0.7.11
v0.7.10
Modules affected
consul-cluster
Description
- The
consul-cluster
module now sets theignore_changes
lifecycle setting onload_balancers
andtarget_group_arns
attributes. As of AWS Provider 3.x, if you useaws_autoscaling_attachment
, you MUST haveignore_changes
set on these attributes, or your load balancer will be removed (see corresponding issue in the AWS provider). Since theconsul-cluster
module doesn't let you use these attributes anyway, this should be a backwards compatible change that allows this module to work properly with a load balancer.
Special thanks
- Thanks to @andrew-womeldorf for the fix!
Related links
v0.7.9
Modules affected
run-consul
Description
- Added a new
--verify-server-hostname
flag torun-consul
that, when set, enables server hostname verification as part of RPC encryption. Each server in Consul should get its own certificate that containsSERVERNAME.DATACENTERNAME.consul
in the hostname or SAN. This prevents an authenticated agent from being converted into a server that streams all data, bypassing ACLs.
Related links
v0.7.8
v0.7.7
Modules affected
consul-cluster
Description
- Set default values for
availability_zones
andsubnet_ids
tonull
inconsul-cluster
. As of AWS Provider 3.x.x, only one of these parameters may be set at a time on an Auto Scaling Group, so we now have to usenull
rather than empty list as our default.
Special thanks
- Thanks to @rafaelremondes for the PR!