Releases: aws-ia/terraform-aws-control_tower_account_factory
Releases Β· aws-ia/terraform-aws-control_tower_account_factory
1.17.0
1.16.1
1.16.0
1.15.1
- Bug fix: Fix an issue where enabling optional CMK encryption for CloudWatch log groups could fail due to KMS policy propagation delays
- Improved
terraform planoutput clarity by removing unnecessary configuration differences for DynamoDB global secondary indexes
1.15.0
- Add optional KMS encryption for CloudWatch log groups and SNS topics using the AFT-created customer managed key (CMK). This encryption can be enabled at the time of deployment using the
cloudwatch_log_group_enable_cmk_encryptionandsns_topic_enable_cmk_encryptionvariables. Learn more about using CMK encryption for Cloudwatch log groups and SNS topics here. (#396)- When first enabling CMK encryption for CloudWatch log groups, an AssociateKmsKey error may occur due to eventual consistency in an updated policy. If this occurs, re-run
terraform apply.
- When first enabling CMK encryption for CloudWatch log groups, an AssociateKmsKey error may occur due to eventual consistency in an updated policy. If this occurs, re-run
- Enable changing CodeBuild compute type, using variable
aft_codebuild_compute_type(#474, #560) - Add new Terraform outputs for DynamoDB table, IAM role, S3 bucket name, KMS Key, Step Function, and SNS Topic ARNs (#81, #84)
- Require SSL for connections to S3 buckets (#300)
- Change DynamoDB tables to on-demand capacity mode, for more efficient utilization (#359, #497)
- Fix error preventing deployment in regions where the SSM global infrastructure parameter is not supported (#501)
- Improved error handling for missing Jinja2 templates in account request and customizations pipelines (#349)
- Update Lambda function dependencies
requests2.32.4boto3/botocore1.39.3
1.14.1
- Fix bug, impacting environments with variable
aft_enable_vpc=falseand no VPCs present, which caused Terraform plan and apply actions to fail.
1.14.0
- Add support for customer provided VPCs at the time of deployment. Learn more about deploying AFT in your own VPC here. (#192)
- Update VPC endpoints to support AWS Organizations when deploying in the
us-east-1AWS Region. (#452) - Add support for providing a project name to deploy AFT workspaces into. This functionality is applicable to Terraform Enterprise and HCP Terraform (formerly Terraform Cloud) customers. (#519, #447, #342)
- Add support for providing customer-defined tags to AFT resources. (#466)
1.13.5
1.13.4
- Change AWS CodeStar Connections to AWS CodeConnections for connecting to third party VCS providers. Customers with an existing external VCS connection will need to:
- Re-authorize the connection through AWS Developer Tools console. Learn more on updating your connection here.
- Run
aft-invoke-customizationsfor all accounts to update the source for account pipelines.
1.13.3
- Update log message input validation for enhanced logging security
- Shorten CodeConnection name to fit within 32 character limit when using GitLab self-managed VCS (#508)
- Upgrade to using V2 of AWS CodePipelines which allows additional parameters for release safety and trigger configuration (#438)
- Update Terraform configurations to remove deprecation warnings (#430)