This repository was archived by the owner on Jan 25, 2023. It is now read-only.
Releases: hashicorp/terraform-aws-vault
Releases · hashicorp/terraform-aws-vault
v0.17.0
Description
- Terraform 1.0 upgrade: We have verified that this repo is compatible with Terraform
1.0.x!- From this release onward, we will only be running tests with Terraform
1.0.xagainst this repo, so we recommend updating to1.0.xsoon! - To give you more time to upgrade, for the time being, all modules will still support Terraform
0.15.1and above, as that version has several features in it (required_providerswithsourceURLs) that make it more forwards compatible with1.0.x.
- From this release onward, we will only be running tests with Terraform
Related links
v0.16.0
Description
- Terraform 0.15 upgrade: We have verified that this repo is compatible with Terraform
0.15.x!- From this release onward, we will only be running tests with Terraform
0.15.xagainst this repo, so we recommend updating to0.15.xsoon! - To give you more time to upgrade, for the time being, all modules will still support Terraform
0.12.26and above, as that version has several features in it (required_providerswithsourceURLs) that make it more forwards compatible with0.15.x. - Once all Gruntwork repos have been upgrade to work with
0.15.x, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.
- From this release onward, we will only be running tests with Terraform
Related links
v0.15.1
v0.15.0
Modules affected
install-vaultprivate-tls-certrun-vaultupdate-certificate-storevault-clustervault-elbvault-security-group-rules
Description
- Terraform 0.14 upgrade: We have verified that this repo is compatible with Terraform
0.14.x!- From this release onward, we will only be running tests with Terraform
0.14.xagainst this repo, so we recommend updating to0.14.xsoon! - To give you more time to upgrade, for the time being, all modules will still support Terraform
0.12.26and above, as that version has several features in it (required_providerswithsourceURLs) that make it more forwards compatible with0.14.x. - Once all Gruntwork repos have been upgrade to work with
0.14.x, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.
- From this release onward, we will only be running tests with Terraform
Related links
v0.14.3
v0.14.2
Modules affected
run-vault
Description
- When using a backend other than Consul,
run-vaultwill now explicitly configure Vault to register itself as a service in Consul. Otherwise, if you're using some other backend, such as S3, service discovery won't work correctly. You can configure the Consul agent address to use for registration via the new--consul-agent-service-registration-addressargument (the default islocalhost:8500). - Updated the
systemdconfig thatrun-vaultsets up for Vault:- Configure reasonable defaults for
StartLimitIntervalSecandStartLimitBurstso Vault doesn't infinitely try to restart in case of a permanent error. - Set
LimitMEMLOCKtoinfinityto prevent memory from being swapped to disk.
- Configure reasonable defaults for
- We've updated the examples to use more modern versions:
- Bump Vault to 1.6.1
- Bump Consul to 1.9.2
Related links
v0.14.1
v0.14.0
Modules affected
- (none)
Description
- Terraform 0.13 upgrade: We have verified that this repo is compatible with Terraform
0.13.x!- From this release onward, we will only be running tests with Terraform
0.13.xagainst this repo, so we recommend updating to0.13.xsoon! - To give you more time to upgrade, for the time being, all modules will still support Terraform 0.12.26 and above, as that version has several features in it (
required_providerswithsourceURLs) that make it more forwards compatible with0.13.x. - Once all Gruntwork repos have been upgrade to work with
0.13.x, we will publish a migration guide with a version compatibility table and announce it all via the Gruntwork Newsletter.
- From this release onward, we will only be running tests with Terraform
Related links
v0.13.11
Modules affected
vault-cluster
Description
- The
vault-clustermodule now sets theignore_changeslifecycle setting onload_balancersandtarget_group_arnsattributes. As of AWS Provider 3.x, if you useaws_autoscaling_attachment, you MUST haveignore_changesset on these attributes, or your load balancer will be removed (see corresponding issue in the AWS provider). Since thevault-clustermodule doesn't let you use these attributes anyway, this should be a backwards compatible change that allows this module to work properly with a load balancer.
Special thanks
- Thank you to @andrew-womeldorf for the PR!
Related links
v0.13.10
Modules affected
vault-cluster
Description
- The
vault-clustermodule now provides output variables with information about the IAM instance profile:iam_instance_profile_arn,iam_instance_profile_id, andiam_instance_profile_name.
Special thanks
- Thank you to @nicgrayson for the PR!