Skip to content

Releases: cloudposse/terraform-aws-elastic-beanstalk-environment

0.3.5

01 Mar 01:13

Choose a tag to compare

Use a variable to enable aws:ec2:vpc:AssociatePublicIpAddress (#27)

0.3.4

23 Jan 20:22
38dedb9

Choose a tag to compare

Fix Security Group ingress rules

what

  • Removed the ingress rule from EC2 Security Group
ingress {
    from_port   = 0
    to_port     = 0
    protocol    = -1
    cidr_blocks = ["0.0.0.0/0"]
  }

why

  • Bad security practice
  • Too broad access from any IP address by default
  • Access should be controlled by provided Security Groups instead of IP ranges
  • Was overriding the next ingress rule for the same Security Group
ingress {
    from_port       = 0
    to_port         = 0
    protocol        = -1
    security_groups = ["${var.security_groups}"]
  }

0.3.3

08 Jan 03:01
9de48a7

Choose a tag to compare

what

  • Bump terraform-null-label version to 0.3.1

why

  • Latest version with bug fixes

0.3.2

08 Jan 00:19
3d478e8

Choose a tag to compare

what

  • Added Travis CI
  • terraform fmt

why

  • To monitor repo status
  • For terraform lint

Add variable for environment tier

02 Jan 16:54

Choose a tag to compare

0.3.1

Add variable for environment tier (#22)

0.3.0: Added timeout variable (#20)

28 Nov 09:29
8b6e299

Choose a tag to compare

What

  • Added configurable timeout

Why

  • For huge and complex envs 20 minutes to became ready is not enough

Allow elb proxy ssh

09 Nov 20:51
447a5e0

Choose a tag to compare

Add SSH Forwarding (#16)

* Added ssh listener

* Fix type cast

* Fix type cast

* Fix type cast

* Fix type cast

* Fix type cast

* Added option to manage ssh port

Add `ec2_instance_profile_role_name` to outputs

18 Oct 22:09

Choose a tag to compare

what

  • Added ec2_instance_profile_role_name to outputs

why

  • To be able to attach additional aws_iam_role_policy_attachment's to the instance profile role from other modules

0.2.7: Add notifications (#13)

06 Oct 07:06

Choose a tag to compare

* Adde notifications

* Added support of different notificaton targets

Add `AmazonEC2ContainerRegistryReadOnly` policy to provide read-only access to `ECR` repositories

03 Oct 23:23

Choose a tag to compare

What

  • Add AmazonEC2ContainerRegistryReadOnly managed policy to EB

Why

  • To provide read-only access to all Amazon ECR repositories in the account

  • When CodePipeline builds and pushes Docker images to ECR and then deploys the file Dockerrun.aws.json to EB with the ECR repo URL specified, EB needs permissions to pull the Docker image from the ECR repo to deploy it to EC2 instances

References