Skip to content

Releases: cloudposse/terraform-aws-mq-broker

v3.4.0

04 Mar 09:51
4d12d27
Compare
Choose a tag to compare

🤖 Automatic Updates

chore(deps): update terraform cloudposse/security-group/aws to v2.2.0 (main) @renovate (#58)

This PR contains the following updates:

Package Type Update Change
cloudposse/security-group/aws (source) module minor 2.0.1 -> 2.2.0

Release Notes

cloudposse/terraform-aws-security-group (cloudposse/security-group/aws)

v2.2.0

Compare Source

`.editorconfig` Typo @​milldr (#​50)
what

fixed intent typo

why

should be spelled "indent"

references

https://cloudposse.slack.com/archives/C01EY65H1PA/p1685638634845009

Sync github @​max-lobur (#​47)

Rebuild github dir from the template

v2.1.0

Compare Source

  • No changes

v3.3.0

04 Mar 09:13
fcc7ec0
Compare
Choose a tag to compare
remove deprecated overwrite_ssm_parameter @andruccho (#71)

Removed deprecated overwrite_ssm_parameter.

v3.2.0

04 Mar 08:44
07f33e7
Compare
Choose a tag to compare
update vpc and broker versions @hans-d (#73)

what

  • bump example vpc module version
  • bump default engine version (variables.tf and example vars)

why

  • terratest failing
  • very outdated vpc module version
  • current default engine version not supported anymore

references

Sync github @max-lobur (#57)

Rebuild github dir from the template

v3.1.0

17 May 09:10
e2038e9
Compare
Choose a tag to compare
  • No changes

v3.0.0 Breaking Changes

30 Mar 22:57
e2038e9
Compare
Choose a tag to compare

Breaking Changes

This module includes breaking changes due to upgrading from terraform-aws-security-group v1 to v2. You can read the full details of the security group changes and how to migrate in migration notes linked below under "references", but the short story is this:

  • If you were using this modules default value of true for security_group_create_before_destroy then you need not make any changes. If you were explicitly setting it to false, we strongly advise you to read the migration notes because that setting previously did not work, raising the question of whether you want to pay the price of converting to the new module with working false behavior or perform the recommended upgrade to the true.
  • If you are referring by ID to the security group created by this module in other security group's rules outside the Terraform plan that controls this one, then you should read the security group migration notes discussion of the new input preserve_security_group_id and probably set it to true

Upgrade versions @johncblandii (#54)

what

  • Upgrade versions to the latest

Key changes in terraform-aws-security-group v2.0 affecting this release

  • create_before_destory default changed from false to true
  • preserve_security_group_id added, defaults to false
  • Terraform version 1.0.0 or later required

why

references

v2.0.1

20 Sep 21:19
702cf9d
Compare
Choose a tag to compare

🚀 Enhancements

Updating sg egress to use input variable @joshmello (#48)

what

Egress was hardcoded to true when there was an input for it.

why

Full egress is not always warranted.

references

  • Link to any supporting github issues or helpful documentation to add some context (e.g. stackoverflow).
  • Use closes #123, if this PR closes a GitHub issue #123

v2.0.0 Breaking changes

08 Jun 22:36
30e9cd5
Compare
Choose a tag to compare

This PR introduces breaking changes. Please review the migration documentation before upgrading.

Update to use Security Group module @milldr (#45)

what

  • Use the new Security Group module version
  • Incorporate open PRs
  • Update test framework

why

  • Unblocking further enhancements
  • Open PRs were based on incompatible pre-release versions
  • Test framework maintenance is not automated

notes

This PR introduces breaking changes and will be released as version 2.0. Migration document is here.

references

v0.15.1 Unstable pre-release

04 Mar 23:26
ee2b3bb
Compare
Choose a tag to compare
Pre-release

🚀 Enhancements

fix: set security_group_enabled false when publicly_accessible is true @luizbossoi (#42)

what

Added a condition to security_group_enabled variable to avoid issues when a broker is created using publicly_accessible true.
By default security_group_enabled is set to true and if you try to create a public broker, you cannot create a security group.

│ Message_: "Broker with [publiclyAccessible] set to true does not support specifying [securityGroups]"

why

This PR was made to avoid a less-experienced when creating a public broker.

references

Terraform error:
│ Message_: "Broker with [publiclyAccessible] set to true does not support specifying [securityGroups]"

v0.15.0 Unstable Pre-Release

15 Jun 19:19
06704f9
Compare
Choose a tag to compare
Pre-release

We are revising and standardizing our handling of security groups and security group rules across all our Terraform modules. This is an early attempt with significant breaking changes. We will make further breaking changes soon, so using this version is not recommended.

Breaking changes

If there is something not documented here, please let us know by filing a ticket.

  • var.allowed_security_groups is removed in favor of the security group module's var.security_group_rules which can contain a single source_security_group_id per rule

  • var.allowed_cidr_blocks is removed in favor of the security group module's var.security_group_rules which can contain a cidr_blocks

  • var.use_existing_security_groups is replaced with var.security_group_enabled (note that if the former was true, the latter should be false)

  • var.existing_security_groups is replaced with var.security_groups

  • security group has moved

    terraform state mv \
      "module.mq_broker.aws_security_group.default[0]" \
      "module.mq_broker.module.security_group.aws_security_group.default[0]"
  • default security_group_rules does not allow ingress but this can be added manually.

    Note: The list must have the same json keys per index

    security_group_rules = [
      {
        type                     = "egress"
        from_port                = 0
        to_port                  = 65535
        protocol                 = "-1"
        cidr_blocks              = ["0.0.0.0/0"]
        source_security_group_id = null
        description              = "Allow all outbound traffic"
      },
      {
        type                     = "ingress"
        from_port                = 0
        to_port                  = 65535
        protocol                 = "-1"
        cidr_blocks              = []
        source_security_group_id = local.security_group_id # provide existing security group or comment out this rule
        description              = "Allow inbound traffic from existing security groups"
      },
      {
        type                     = "ingress"
        from_port                = 0
        to_port                  = 65535
        protocol                 = "-1"
        cidr_blocks              = [] # provide cidr blocks or comment out this rule
        source_security_group_id = null 
        description              = "Allow inbound traffic from CIDR blocks"
      }
    ]
  • security group rules have been moved

    Note: since the new security group rule names are generated upon a plan, the plan will need to be run first to generate the new names in order to move the rules. Replace someguid with the appropriate value.

    terraform state mv \
      'module.mq_broker.aws_security_group_rule.egress[0]' \
      'module.mq_broker.module.security_group.aws_security_group_rule.default["egress--1-0-65535-someguid"]'
    terraform state mv \
      'module.mq_broker.aws_security_group_rule.ingress_security_groups[0]' \
      'module.mq_broker.module.security_group.aws_security_group_rule.default["ingress-tcp--1-0-65535-someguid"]'
    terraform state mv \
      'module.mq_broker.aws_security_group_rule.ingress_cidr_blocks[0]' \
      'module.mq_broker.module.security_group.aws_security_group_rule.default["ingress-tcp--1-0-65535-someguid"]'
feat: use security-group module instead of resource @SweetOps (#32)

what

  • use security-group module instead of resource
  • update tests

why

  • more flexible than current implementation
  • bring configuration of security group/rules to one standard

references

  • CPCO-409

v1.0.0 Initial release with production Semantic Versioning

10 May 18:32
3951c8e
Compare
Choose a tag to compare

Initial release with production Semantic Versioning, part of Cloud Posse's general policy to convert to production versioning as we make updates to relatively mature modules, especially those where we see breaking changes coming in the near future. Version 2.0 of this module with breaking changes will be released soon as we convert it to use our security-group module.

This version is exactly the same as version 0.14.0. Use of versions 0.15.0 or 0.15.1 is not supported, and upgrading from those versions to any later version will involve breaking changes without explicit migration instructions.