Skip to content

Releases: cloudposse/terraform-aws-ec2-client-vpn

v0.12.1

11 May 00:41
3350fb2
Compare
Choose a tag to compare

🤖 Automatic Updates

Update Terraform cloudposse/security-group/aws to v1 @renovate (#42)

This PR contains the following updates:

Package Type Update Change
cloudposse/security-group/aws (source) module major 0.4.3 -> 1.0.0

v0.12.0

21 Apr 18:06
f581b12
Compare
Choose a tag to compare
Add longer timeouts to aws_ec2_client_vpn_route @rpadovani (#40)

Default timeout for aws_ec2_client_vpn_route is 1 minute for all operations.

Trying to attach routes in eu-central-1 for a peered VPC, it constantly fails with:

│ Error: error waiting for EC2 Client VPN Route (cvpn-endpoint-xxx,subnet-yyy,10.100.0.0/16) create: timeout while waiting for state to become 'active' (last state: 'creating', timeout: 1m0s)
│ 
│   with module.ec2_client_vpn[0].aws_ec2_client_vpn_route.default[0],
│   on .terraform/modules/ec2_client_vpn/main.tf line 242, in resource "aws_ec2_client_vpn_route" "default":
│  242: resource "aws_ec2_client_vpn_route" "default" {

and

│ Error: error waiting for EC2 Client VPN Route (cvpn-endpoint-xxx,subnet-yyy,10.100.0.0/16) delete: timeout while waiting for resource to be gone (last state: 'deleting', timeout: 1m0s)

With this commit, we increment the timeout to 5 minutes. In my experiments, the route is always available in around 90 seconds. 5 minutes gives us plenty of time, and still is not too long to wait in case of problems.

Upstream issue: hashicorp/terraform-provider-aws#23787

I think fixing here is good, until we wait for an upstream improvement, because I am currently blocked

what

  • Increase Terraform timeouts for aws_ec2_client_vpn_route

why

  • Route creation fails constantly due to timeout, leaving the resources tainted

references

v0.11.2

20 Apr 23:34
973eb9c
Compare
Choose a tag to compare

🤖 Automatic Updates

Update Terraform cloudposse/cloudwatch-logs/aws to v0.6.5 @renovate (#39)

This PR contains the following updates:

Package Type Update Change
cloudposse/cloudwatch-logs/aws (source) module patch 0.6.4 -> 0.6.5

Release Notes

cloudposse/terraform-aws-cloudwatch-logs

v0.6.5

Compare Source

🚀 Enhancements

Add policy boundary and enable_tags for iam resouces @​jamengual (#​32) #### what * Add policy boundary to cloudwatch IAM resources * Updating to new tags_enabled variable from I am role module #### why * to pass policy_boundary and to add the ability to disable tags for IAM resources #### references * https://github.com/cloudposse/terraform-aws-iam-role/pull/44

v0.11.1

20 Apr 17:45
a822a8b
Compare
Choose a tag to compare
Add `session_timeout_hours` option @rpadovani (#38)

what

Add session_timeout_hours option, to be able to define after how many hours clients should reauthenticate.

why

  • I need such an option

references

Restore automatic github/update @Nuru (#36)

what

  • Restore automatic github/update

why

  • Included in #35 was an update to auto-readme to be used to validate the fix. In order to keep the fix from being reverted by pr/auto-format, the PR included a file to prevent auto-updates to workflows. Now that the fix is part of the auto update, we can and should restore auto-updates to this project.

references

v0.11.0

10 Mar 03:28
2adcce8
Compare
Choose a tag to compare
Add self service portal @nitrocode (#35)

what

  • Add self service portal
  • Update tests to current standard for go 1.17
  • Update workflows

why

  • Allow users to customize the portal when connecting to the client vpn
  • Routine maintenance

references

module "client_vpn" {
  source = "git::https://github.com/cloudposse/terraform-aws-ec2-client-vpn.git?ref=portal"

  # ...
}

v0.10.10

22 Feb 21:10
6ad9ff5
Compare
Choose a tag to compare

🚀 Enhancements

Removed var.internet_access_enabled @pwilczynskiclearcode (#32)

what

  • Removed var.internet_access_enabled from documentation. It is a leftover from code changes done in many commits behind.

v0.10.9

22 Feb 16:22
5c6cb23
Compare
Choose a tag to compare

🚀 Enhancements

fix dns_servers description @kpankonen (#27)

what

  • The default for dns_servers is to use the client's DNS not the VPC

references

v0.10.8

27 Jan 21:18
33f9766
Compare
Choose a tag to compare

🚀 Enhancements

Fix: Change Type of `authorization_rules` to `any` @nitrocode (#29)

what

  • Change auth rules interface to any instead of an explicit object

why

  • Requests came in so we dont have to set access_group_id and authorize_all_groups if one of them has to explicitly be set to null. With this PR merged, we can omit the unused key completely.

references

N/A

v0.10.7

27 Jan 21:00
873455f
Compare
Choose a tag to compare

🚀 Enhancements

Self Signed Certs all have hardcoded names, not allowing for multiple Client VPNs in a region @garrinmf (#24)

what

The certificate names are all hardcoded, not allowing modification via context.

why

In order to have multiple Client VPNs in the same region, the keys stored in SSM need to be unique, the hardcoded approach doesn't allow this.

I really don't know best practices around backwards compatibility or naming in general, just that the way it is doesn't allow for specifying unique names for the stored SSM keys. let me know if a different approach would work better.

references

v0.10.6

20 Jan 02:58
0e4f0d9
Compare
Choose a tag to compare

🤖 Automatic Updates

Update Terraform cloudposse/cloudwatch-logs/aws to v0.6.4 @renovate (#28)

This PR contains the following updates:

Package Type Update Change
cloudposse/cloudwatch-logs/aws (source) module patch 0.6.3 -> 0.6.4

Release Notes

cloudposse/terraform-aws-cloudwatch-logs

v0.6.4

Compare Source

🤖 Automatic Updates

Update Terraform cloudposse/iam-role/aws to v0.15.0 @​renovate (#​29)

This PR contains the following updates:

Package Type Update Change
cloudposse/iam-role/aws (source) module minor 0.14.1 -> 0.15.0

Release Notes
cloudposse/terraform-aws-iam-role ##### [`v0.15.0`](https://togithub.com/cloudposse/terraform-aws-iam-role/releases/0.15.0)

Compare Source

allow to set role and policy path @​&#​8203;1david5 (#&#​8203;40) ##### what * Add `path` argument to role and policy resources ##### why * Allow users to set path for role and policy

Configuration

📅 Schedule: At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, click this checkbox.

This PR has been generated by WhiteSource Renovate. View repository job log here.


Configuration

📅 Schedule: At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, click this checkbox.

This PR has been generated by WhiteSource Renovate. View repository job log here.