Gruntwork release 2017-04
Guides / Update Guides / Releases / 2017-04
This page is lists all the updates to the Gruntwork Infrastructure as Code
Library that were released in 2017-04. For instructions
on how to use these updates in your code, check out the updating
documentation.
Here are the repos that were updated:
Published: 4/24/2017 | Release notes
- The publish-amiscript in theaws-helpersmodule now accepts an argument for--markdown-title-textso that the output markdown file may include an optional customized title.
Published: 4/23/2017 | Release notes
- NEW MODULE: We've added a new module publish-ami that will copy the given AMI to the desired AWS regions (or all AWS regions) and make it public.  - We added this module because Gruntwork will soon be releasing open source modules for Vault, Nomad, and Consul and we needed a way to make AMIs built by those modules globally available and usable by anyone. 
Published: 4/11/2017 | Release notes
- UPDATE: build-go-binariesnow defaults toCGO_ENABLED=0to build completely static binaries that do not depend on a specific implementation of C. This was requested because an Alpine Linux user (using the musl C library) could not run one of our binaries. Note that a--cgo-enabledoption has been added that defaults tofalsebut can be set totrueto revert to the original behavior.
Published: 4/6/2017 | Release notes
- UPDATE: HashiCorp changed the GitHub Packer repo from github.com/mitchellh/packer to github.com/hashicorp/packer. Because our curlcommands didn't handle a redirect, this caused some of our scripts to fail. This update fixes that issue.
Published: 4/27/2017 | Release notes
  POTENTIAL DOWNTIME
https://github.com/gruntwork-io/module-data-storage/pull/20: Fix a bug where the RDS and Aurora module would exit with an error if you set storage_encrypted to false. 
Note: that if you update to this new version of module-data-storage and run apply, it will undeploy your old DB and deploy a new one to replace it. That's because fixing this bug required renaming the DB resources, which Terraform sees as a delete + create. 
To avoid this, you will need to use the terraform state mv command. 
Aurora
If you do not have encryption enabled:
terraform state mv module.database.aws_rds_cluster.cluster module.database.aws_rds_cluster.cluster_without_encryption
If you have encryption enabled:
terraform state mv module.database.aws_rds_cluster.cluster module.database.aws_rds_cluster.cluster_with_encryption
RDS
If you do not have encryption enabled:
terraform state mv module.database.aws_db_instance.primary module.database.aws_db_instance.primary_without_encryption
terraform state mv module.database.aws_db_instance.replicas module.database.aws_db_instance. replicas_without_encryption
If you have encryption enabled:
terraform state mv module.database.aws_db_instance.primary module.database.aws_db_instance.primary_with_encryption
terraform state mv module.database.aws_db_instance.replicas module.database.aws_db_instance. replicas_with_encryption
Published: 4/1/2017 | Release notes
Published: 4/1/2017 | Release notes
Published: 4/1/2017 | Release notes
Published: 4/24/2017 | Release notes
Published: 4/28/2017 | Release notes
Published: 4/27/2017 | Release notes
Published: 4/27/2017 | Release notes
- NEW MODULE: We've added a module, iam-user-password-policy that makes it easy to use Terragrunt to create a password policy for your IAM Users.
Published: 4/26/2017 | Release notes
Published: 4/26/2017 | Release notes
Published: 4/25/2017 | Release notes
Published: 4/2/2017 | Release notes
Published: 4/1/2017 | Release notes
Published: 4/4/2017 | Release notes