Skip to content

Releases: cloudposse/terraform-aws-ecs-alb-service-task

v0.44.0

06 Jan 17:16
8e5dc3f
Compare
Choose a tag to compare
Terraform 0.14 upgrade @maximmi (#90)

what

  • Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard

why

  • Support Terraform 0.14

v0.43.0

06 Jan 16:23
b631ce5
Compare
Choose a tag to compare
Update null-label to restore attribute order @Nuru (#87)

what

  • Update terraform-null-label to restore attribute order handling in place prior to #82

why

  • Automatic merging of old attributes with new attributes was added to terraform-null-label v0.19.0 and incorporated into this module in #82. However, prior to terraform-null-label v0.22.1, it placed new attributes in front of old attributes, instead of the previous behavior of this module, which was to place new attributes at the end of the attribute list. This causes unnecessary and unwanted changes in resource names.

references

v0.42.3

22 Dec 03:39
52f8e32
Compare
Choose a tag to compare

🤖 Automatic Updates

Update Terraform cloudposse/label/null to v0.22.1 @renovate (#88)

This PR contains the following updates:

Package Type Update Change
cloudposse/label/null (source) terraform patch 0.22.0 -> 0.22.1

Release Notes

cloudposse/terraform-null-label

v0.22.1

Compare Source

Add var.attributes to end of context.attributes, not vice versa @​Nuru (#​114)

what

  • Add var.attributes to end of context.attributes, not vice versa
  • Update to current workflows (with some exceptions)

why

  • Modules should append to attributes passed in, not insert themselves ahead of others
  • New features, like auto-format (but holding back some, because this is a special module)

references

  • closes #​113
  • closes #​108

v0.42.2

21 Dec 04:23
40c29c9
Compare
Choose a tag to compare

🚀 Enhancements

Add task_exec and task role policy attachments @sodre (#84)

what

  • Creates two variables to accept a list of policies to attach to the generated task and task execution roles
  • The policies are only attached if the the roles were created by this module.

why

  • When creating services that reference outside secrets it would be easier to pass the required policy during service creation.

references

  • This is related to #67 and #68
  • Supersedes and closes #86

v0.42.1

21 Dec 03:23
b2466fa
Compare
Choose a tag to compare

🚀 Enhancements

Terraform 0.14 upgrade @Nuru (#85)

what

  • Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard

why

  • Support Terraform 0.14

v0.42.0

01 Dec 21:39
e8f90ee
Compare
Choose a tag to compare
Don't pass IAM role to ECS Service when there are more than one Target Groups @msmagoo87 (#83)

what

  • In the case of registering more than one Target Group, don't create or pass the ECS service IAM role to the aws_ecs_service block.

why

  • If you are registering multiple target groups to the service, you must allow ECS to create a service-linked role rather than passing one that was manually created. Passing one results in an API error from ECS: Error: InvalidParameterException: You cannot specify an IAM role for services that require a service linked role.

references

0.41.0: Use context.tf and latest null-label module (#82)

18 Nov 13:31
869323a
Compare
Choose a tag to compare

0.40.2

30 Oct 02:46
118df45
Compare
Choose a tag to compare

what

  • Update to accept aws provider 3

why

  • To make provider versions compatible

0.40.1: Lookup authorization_config under efs_volume_config (#76)

24 Sep 20:47
c179672
Compare
Choose a tag to compare
It was looking for authorization_config under volume instead of efs_configuration

Close #74

0.40.0: Make adding all egress rule to the ECS security group optional (#75)

16 Sep 14:08
aa5c2fa
Compare
Choose a tag to compare
* Make adding all egress rule to the ECS security group optional

* Updated README.md

Co-authored-by: Alex Taylor <[email protected]>
Co-authored-by: actions-bot <[email protected]>