Skip to content

Releases: Cox-Automotive/terraform-provider-alks

1.3.1

25 Oct 18:05
96fed0d
Compare
Choose a tag to compare

This release includes:

  • The enable_alks_access flag now updates resources in place

1.3.0

03 Jun 18:58
93b82cd
Compare
Choose a tag to compare

This release includes:

1.2.2

16 May 20:36
e1a8f08
Compare
Choose a tag to compare

This release includes:

  • Support for ECS container credentials
  • Improved error reporting
  • Provider will now properly detect missing IAM roles (enabling commands like terraform refresh)

1.2.1

06 Feb 18:59
5f99fb2
Compare
Choose a tag to compare

This Release Includes:

  • Bug fix: Roles created prior to the 1.1.0 release will no longer ForceNew

1.2.0

22 Jan 22:32
32bd84a
Compare
Choose a tag to compare

This Release Includes:

  • Support for Machine Identities (both using and creating roles that support Machine Identities)
  • Support for EC2 Instance Role credentials
  • Support for the assume_role provider pattern (similar to this feature of the AWS provider)

1.1.0

17 Jan 22:43
70bd960
Compare
Choose a tag to compare
1.1.0 Release

1.0.0

08 Oct 18:19
Compare
Choose a tag to compare

This release includes:

  • Cross account roles
  • Updates provider to Terraform 0.10.0 provider spec and changes versioning style
  • Adds improved error messaging in place of the gnarly "Please validate your username/password and account/role" error

0.9.11.1

16 Nov 18:19
Compare
Choose a tag to compare

This updates adds the following improvements:

  • Removes username/password authentication
  • Removes the requirement for specifying the ALKS account and role
  • Adds support for authentication using STS tokens the same way that the AWS provider does
  • Adds multiple STS authentication options including tokens via environment parameters, hardcoded tokens and AWS profile credentials
  • Improves error reporting

0.9.11

31 Jul 23:55
Compare
Choose a tag to compare

This updates adds the following improvements:

  • macOS Keychain support: If you have the ALKS CLI installed and have run alks developer configure then you only need to supply your username to ALKS. The provider will look up your password in the Keychain. Be sure to click "Always Allow" when prompted by Keychain. Thanks @devinsba
  • Validate credentials and ALKS account/role during terraform plan and terraform apply: This means you'll now be alterted to invalid credentials or accounts prior to attempting to provision the new infrastructure.
  • Return instance profile ARN: This was previously returned incorrectly formatted.
  • Improved error messaging (duplicate role names, etc)

0.9.0

30 Mar 18:38
Compare
Choose a tag to compare
Dropped a space, oops.