Releases: cloudposse/terraform-aws-ecs-alb-service-task
Releases · cloudposse/terraform-aws-ecs-alb-service-task
v0.64.0
Adding option to disable tags on roles @jamengual (#162)
what
- Enable / Disable tangs on roles
why
- in some restricted environments tags on roles are not allowed when using compliance rules like https://tugboatlogic.com/ TugBoat or others.
references
v0.63.1
🚀 Enhancements
Correct type definition for `efs_volumes` and `docker_volumes` vars @alexstophel (#161)
what
- Update child attribute volume_configuration to
efs_volume_configuration
anddocker_volume_configuration
why
- In
main.tf
when iterating over the volumes it is looking forefs_volume_configuration
anddocker_volume_configuration
instead of justvolume_configuration
.
** Without this change, configuration is always omitted.
references
v0.63.0
Allow disabling the default Security Group @ento (#160)
what
- This PR adds a new variable,
security_group_enabled
(default: true), that lets you disable the creation ofaws_security_group.ecs_service
why
- Currently there is no way to disable the creation of
aws_security_group.ecs_service
, even if you disable its security group rules throughvar.enable_all_egress_rule
,var.enable_icmp_rule
,var.use_alb_security_group
, andvar.use_nlb_cidr_blocks
. - In my case, I wanted to use my own security group by specifying its id in
var.security_group_ids
. Not being able to disable the creation ofaws_security_group.ecs_service
led to clutter in the list of security groups in AWS console and potential confusion as to which ones were actually used - It would also be an option to not create
aws_security_group.ecs_service
when no security group rules would be created, but I thought it better to have an explicit variable for controlling it
v0.62.1
🚀 Enhancements
Don't create IAM role for the service if there are no load balancers @ento (#156)
what
- #155 was meant/stated to fix #136, but the PR didn't actually change the line that was causing the issue
- This PR makes the necessary change to fix the issue, which is to change the conditional for determining whether to create an IAM role for the ECS service that this module provisions: don't create the role if
var.ecs_load_balancers
is empty; otherwise, create it
why
- The IAM role is assigned a policy that allows it to call load balancer APIs, which isn't necessary if no load balancing is needed
- Trying to attach the role to the ECS service anyways with network mode set to bridge results in an error as noted by #136
references
Previous PRs
v0.62.0
#146 fixes volume configuration bug where both docker and EFS volumes are c… @bradj (#159)
…reated yet only one is needed #146
what
- Removes
volumes
variable in favor of two variables:efs_volumes
anddocker_volumes
why
- Currently, both
docker_volume_configuration
andefs_volume_configuration
properties are required on allvolumes
objects - This causes 2 volume blocks to be created: one as
docker_volume_configuration
and the other asefs_volume_configuration
regardless of which is actually needed - The
aws_ecs_task_definition
resource does not allow multiple types of volumes to be defined and throws the errorClientException: When the volume parameter is specified, only one volume configuration type should be used.
references
- Side effect of Optional arguments in object variable type definition
- closes #146
v0.61.0
v0.60.1
v0.60.0
🚀 Enhancements
Restore release cadence @Nuru (#155)
what and why
- Reverts #117, #120, #151 to restore the ability to move forward on bug fixes and new features while maintaining backward compatibility
- Supersedes and closes #118, closes #136, via #137, #145, thanks to @ragumix, @verbalius, @asiragusa
- Reimplements #120 reverted above to maintain that functionality, closes #122, thanks to @flywheelnz, @joe-niland
- Fixes #123
- Supersedes #125, thanks to @nitrocode
- Supersedes and closes #129, closes #130, closes #133
- Supersedes and closes #138, thanks to @mrsufgi
- Closes #139, supersedes and closes #140, thanks to @fentonfentonfenton
- Supersedes #143, closes #142, thanks to @missylbytes
- Supersedes #144, thanks to @mrsufgi
- Supersedes, implements, and closes #151, closes #152, thanks to @ethanrubio
- Supersedes #154, thanks to @korenyoni
v0.59.0
feat: add configurable runtime @ethanrubio (#151)
what
- add configurable runtime platform to the AWS task definiton
why
- so we can spin up ARM Fargate tasks
references
v0.58.0 Unstable Pre-release
We are revising and standardizing our handling of security groups and security group rules across all our Terraform modules. This is an early attempt with significant breaking changes. We will make further breaking changes soon, so using this version is not recommended.
Updated with deployment circuit breaker @flywheelnz (#120)
what
- Updated to support deployment circuit breaker and optional rollback
why
- AWS feature compatability