Releases: cloudposse/terraform-aws-alb
Releases · cloudposse/terraform-aws-alb
v0.26.0
Add fixed response option on listeners (http or https) @msmagoo87 (#69)
what
- Add an optional fixed response to the default auction of the listener (http or https).
why
- I have a case where I am using a Cloudfront distribution that passes a special header to verify the validity of the request (as described here https://www.arhs-group.com/protecting-aws-alb-behind-aws-cloudfront-distribution/). I want to use a listener rule to respond with a 403 if that header is missing or incorrect. Since the module always forwards to the TG unconditionally, I am adding this feature as an alternative.
v0.25.0
v0.24.0
Multicert http listener @jamengual (#66)
what
- Adding SNI support
why
- variable was added but the resource was missing
v0.23.0
Adding SNI cert support @jamengual (#64)
what
- Enable SNI support for https listener when https listener is enabled
why
- many times an alb is reuse for multiple urls and with SNI support we can attach multiple certs to the same listener
references
v0.22.0
Add health_check_path to allow the health check to use a port other than traffic-port @msmagoo87 (#63)
what
- Allows the specification of a health check port that is not the traffic-port.
why
- The health check endpoint doesn't necessarily always exist on the default traffic-port, as is my case.
v0.21.0
fix: update s3 bucket & context tags @tirumerla (#62)
what
- Bump the tag for s3 bucket module to use
>= 2.0for aws provider to avoid module version conflicts when used with >= 3.0 modules (eg. aws-eks-node-group). - Bump the tag to
0.21.0forterraform-null-labelmodule to support future versions of TF.
why
- This module is being used with terraform-aws-eks-node-group which needs aws provider version to be >= 2.0 to fix version conflicts.
references
- See cloudposse/terraform-aws-eks-node-group#41 for details. This tackles one of the modules causing the issue.
v0.20.0
v0.19.0
Add enabled variable @jblackburn22 (#56)
what
This allows the ALB to be created selectively.
why
As a cost saving measure, I want to be able to create an ALB per AWS account for a given application and then create multiple target groups.
references
- This addresses #55.
v0.18.0
Updated version constraints @MartinCanovas (#59)
The aws = ~> 2.0 causes error in Terraform 0.13:
Error: Failed to query available provider packages
Could not retrieve the list of available versions for provider hashicorp/aws:
no available releases match the given constraints >= 3.0.*, >= 2.0.*, >=
2.0.*, >= 2.0.*, >= 2.0.*, >= 2.0.*, < 4.0.*, ~> 2.0, ~> 2.0, ~> 2.0, ~> 2.0,
~> 2.0, ~> 2.0, >= 2.0.*, < 4.0.*, >= 3.0.*, >= 2.0.*, >= 2.0.*, >= 2.0.*
what
- Describe high-level what changed as a result of these commits (i.e. in plain-english, what do these changes mean?)
- Use bullet points to be concise and to the point.
why
- Provide the justifications for the changes (e.g. business case).
- Describe why these changes were made (e.g. why do these commits fix the problem?)
- Use bullet points to be concise and to the point.
references
- Link to any supporting github issues or helpful documentation to add some context (e.g. stackoverflow).
- Use
closes #123, if this PR closes a GitHub issue#123
v0.17.0
fix: update upsteam dependency @OblateSpheroid (#54)
what
- module
access_logsis using tagged version that has issues with TF 0.13, so updating to use a fixed version of that module
why
- this module currently fails with TF 0.13, and has no tests for TF 0.13 to automatically detect these issues