Gruntwork release 2022-07
Guides / Update Guides / Releases / 2022-07
This page is lists all the updates to the Gruntwork Infrastructure as Code
Library that were released in 2022-07. For instructions
on how to use these updates in your code, check out the updating
documentation.
Here are the repos that were updated:
Published: 7/19/2022 | Release notes
Published: 7/18/2022 | Release notes
Published: 7/11/2022 | Release notes
- Fixed bug where boilerplate preferred the variable defaults defined in the variablesfield of thedependencyobject over the var file values, unlike what was implied by the documentation.
This release has two intentional behavior changes:
- boilerplatewill now prefer values specified in- var_fileson the- dependencyover the- defaultvalue of- variables.
- boilerplatewill no longer ask for variables specified on- dependencyin interactive mode.
- boilerplateno longer supports bare variable definitions on- dependencyconfig (that is, you must specify a- defaultor- referencewhen adding a variable to the- variableslist on a- dependencyconfig.
If you were relying on either of these behaviors, please file a GitHub issue with your use case so we can discuss alternatives.
Published: 7/11/2022 | Modules affected: server-group | Release notes
- Fixes attachment of security groups in the server-groupmodule when using both the option to create ENIs and externally attaching additional security groups.
Published: 7/13/2022 | Modules affected: ecs-deploy-runner | Release notes
- Updated ecs-deploy-runnerto support tagging of multiple images
Published: 7/6/2022 | Release notes
- Fixed bug in upgrade testing module find and replace where it matched modules with the same prefix.
Published: 7/6/2022 | Modules affected: ecs-deploy-runner-standard-configuration, ecs-deploy-runner | Release notes
- Added option --no-pushtodocker-image-builderto perform only building of container images and avoid pushing to registry.
Published: 7/5/2022 | Modules affected: ecs-deploy-runner | Release notes
- Updated refs for terraform-aws-ciin Dockerfiles forecs-deploy-runner.
- Added patch testing on PRs within the upgrade test runner.
Published: 7/18/2022 | Modules affected: steampipe-runner | Release notes
Published: 7/15/2022 | Modules affected: steampipe-runner, ecs-deploy-runner-steampipe-standard-configuration | Release notes
Published: 7/6/2022 | Modules affected: steampipe-runner, ecs-deploy-runner-with-steampipe-runner, ecs-deploy-runner-steampipe-standard-configuration | Release notes
- steampipe-runner
 
- ecs-deploy-runner-with-steampipe-runner
 
- ecs-deploy-runner-steampipe-standard-configuration
 
- Updated the underlying go dependency versions of the - run-steampipe-mod-checktrigger command for the- steampipe-runner.
 
- Fixed bug where - --publish-to-securityhubdid not work due to security token failures when running in the ECS Deploy Runner.
 
- Added new option - --report-global-to-regionwhich allows publishing global findings (e.g., issues with IAM) to Security Hub in the specified region.
 
https://github.com/gruntwork-io/terraform-aws-ci-steampipe/pull/28
Published: 7/28/2022 | Modules affected: observability/cloudwatch-logs-metric-filters, observability/aws-config-multi-region, landingzone/account-baseline-app, landingzone/account-baseline-root | Release notes
- Updated dependencies:- terraform-aws-monitoring:- v0.35.1to- v0.35.2
- terraform-aws-service-catalog:- v0.93.0to- v0.93.1
- terraform-aws-lambda:- v0.20.0to- v0.20.1
- Lambda python runtime: 3.7to3.9
 
- Updated test dependencies.
Published: 7/27/2022 | Modules affected: landingzone/account-baseline-app, landingzone/account-baseline-root, landingzone/account-baseline-security, observability/aws-config-multi-region | Release notes
- Exposed flag enable_root_account_mfa_rulefor AWS Config to allow disabling the root user MFA AWS Config rule. This should only be turned off for AWS partitions that do not support a root user (e.g., GovCloud).
Published: 7/27/2022 | Modules affected: security/aws-securityhub, landingzone/account-baseline-app, landingzone/account-baseline-security, landingzone/account-baseline-root | Release notes
- Updated hardcoded ARNs to lookup AWS partition information to support deployment into alternative partitions such as GovCloud.
- Update dependencies:- terraform-aws-service-catalog:- v0.90.7=>- v0.93.0
- terraform-aws-security:- v0.64.7=>- v0.65.8
- Test Golang dependencies
- CLI Golang dependencies for codegenlibrary
 
Published: 7/21/2022 | Modules affected: landingzone/account-baseline-app, landingzone/account-baseline-root, landingzone/account-baseline-security, observability/cloudtrail | Release notes
- Exposed the ability to configure cross account SNS Topic access. You can use the new cloudtrail_benchmark_alarm_external_aws_account_ids_with_publish_accessandcloudtrail_benchmark_alarm_external_iam_entities_with_list_subscription_accessinput variables to configure cross account access for various scenarios.
Published: 7/15/2022 | Modules affected: observability/cloudwatch-logs-metric-filters, observability/cloudtrail, landingzone/account-baseline-app, landingzone/account-baseline-security | Release notes
- Updated cloudtrailto configure object level data logging for ALL S3 buckets, not just the CloudTrail bucket. Previously the compliance requirement 3.10 and 3.11 was misinterpreted to mean only the CloudTrail bucket when in reality all S3 buckets in the account required to be monitored.
- Exposed the additional_data_logging_resourcesinput variable in theaccount-baselinemodules to configure additional data logging resources on the CloudTrail instance.
- Added the ability to configure AWS Organizations metric filters in child accounts. While these are not strictly necessary, configuring them may be useful for satisfying various automated checks for CIS.
- Fixed bug where the CloudTrail metric filter SNS topics were not being encrypted with the CloudTrail KMS Key as originally intended.
Published: 7/13/2022 | Modules affected: landingzone/account-baseline-app, landingzone/account-baseline-root, landingzone/account-baseline-security, observability/cloudtrail | Release notes
- Added the ability to configure a subscription to the SNS Topic for CloudTrail CIS benchmark alarms that sends the alerts to a Slack Channel.
Published: 7/11/2022 | Modules affected: landingzone/account-baseline-root, landingzone/account-baseline-security, landingzone/account-baseline-app, security/cleanup-expired-certs | Release notes
- Updated the AWS Config Aggregator to force to aggregating all regions. This is due to the CIS control 3.5 that requires AWS Config be enabled in all regions, so it makes sense to always require aggregating all regions.
- Updated dependencies:- terraform-aws-lambda:- v0.19.3to- v0.20.0
- terraform-aws-security:- v0.65.6to- v0.65.7
 
Published: 7/7/2022 | Modules affected: networking/vpc-mgmt, networking/vpc-mgmt-network-acls, networking/vpc, networking/vpc-app-network-acls | Release notes
- Fixed a CIS Compliance misinterpretation for control 5.1 (VPC NACLs). Control 5.1 states Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports, which was originally interpreted to mean that there should be no network ACL that effectively allows ingress from0.0.0.0/0on admin ports, but the popular interpretation is that there should be no network ACL rule that allows ingress from0.0.0.0/0, even if a higher priority rule explicitly denies access. As such, starting this release, the network ACL rules are adjusted to ensure that no rule allows ingress from0.0.0.0/0in all rules configured.
Published: 7/7/2022 | Modules affected: landingzone/account-baseline-root, landingzone/account-baseline-security, landingzone/account-baseline-app, security/aws-securityhub | Release notes
- Added the ability to configure an aggregator region to roll up the findings to in Security Hub. Note that only administrator accounts can designate an aggregator region.
Published: 7/5/2022 | Modules affected: networking/vpc, networking/vpc-mgmt | Release notes
- Added the ability to disable private SSH and RDP access at the NACL level, using the new enable_administrative_remote_access_private_subnets_from_self(for mgmt VPC),enable_administrative_remote_access_private_app_subnets_from_selfandenable_administrative_remote_access_private_persistence_subnets_from_self(for app VPC) variables.
- Added the ability to configure the remote administrative ports for the NACLs from the VPC layer using the new remote_administrative_portsvariable.
Published: 7/1/2022 | Modules affected: landingzone/account-baseline-security | Release notes
- Exposed the ability to configure max_password_ageand passwordhard_expiryfor the IAM Password Policy fromaccount-baseline-security.
Published: 7/21/2022 | Modules affected: aurora | Release notes
- Fixed bug where auroramodule could not be configured with arestore_to_timesetting due to mutual exclusivity.
Published: 7/19/2022 | Modules affected: rds | Release notes
- Added the ability to configure the character sets for the RDS Database for Oracle and MSSQL types.
Published: 7/5/2022 | Modules affected: aurora, backup-plan, backup-vault, efs | Release notes
- Unlock AWS provider v4. Require minimum 3.75.1. This update includes a few tests that make sure upgrading to this module from the last release is easy. However, you may need to bump your AWS provider version. See the migration guide notes below for more.- Fixed a perpetual diff problem in examples/rds-mysql-with-cross-region-replica. If you've used this example, you've probably already noticed this in your own code when re-running apply. We've updated the example to include thevar.storage_encryptedsetting in all example code that references themodules/rdsmodule.
- Uncovered an undocumented (as of this release) backward incompatibility in the AWS Provider v4 upgrade from v3.75. We've handled this within the modules/rdslogic so you don't have to update your code.
 
Published: 7/28/2022 | Modules affected: run-lambda-entrypoint | Release notes
- Added the ability to configure multiple secrets manager entries for container based Lambda functions in the run-lambda-entrypointcommand.
Published: 7/18/2022 | Modules affected: lambda | Release notes
- Add patch that automates upgrading from v0.16.xtov0.17.0.
- Adds tracing_configvariable
- Update aws_arn datacall to use data partition
Published: 7/7/2022 | Modules affected: api-gateway-account-settings, api-gateway-proxy-methods, api-gateway-proxy, keep-warm | Release notes
- Unlock AWS provider v4. Require minimum 3.75.1. This update includes a few tests that make sure upgrading to this module from the last release is easy. However, you may need to bump your AWS provider version. See the migration guide notes below for more info.
- Internal updates:- Updated code owners
- Added upgrade testing
- Patches added: - `v0.15.0`
 - `v0.16.0`
 - `v0.14.0`
 
 
 
Published: 7/27/2022 | Modules affected: alarms | Release notes
- Add variable to configure how to treat missing data for Memcached and Redis alarms
Published: 7/21/2022 | Modules affected: logs/cloudwatch-logs-metric-filters | Release notes
- Added the ability to configure the SNS Topic with cross account access for publish and list subscriptions.
Published: 7/12/2022 | Modules affected: alarms/sns-to-slack | Release notes
- Updated sns-to-slackmodule to require passing through the Slack webhook URL using AWS Secrets Manager instead of directly as module variables. This is to treat the webhook URL more like a Secret as recommended by Slack.
Published: 7/11/2022 | Modules affected: ssh-grunt | Release notes
- Updated Go dependencies of ssh-gruntandcodegenutilities. There are no updates to the functionality of the CLI tools.
Published: 7/7/2022 | Modules affected: aws-config-multi-region, aws-config | Release notes
- Added partial support for deploying AWS Config in previously unsupported region ap-northeast-3.
Published: 7/21/2022 | Modules affected: ec2-backup | Release notes
- Replaces hardcoded IAM arn with a data source, for compatibility with multiple partitions
Published: 7/15/2022 | Modules affected: single-server | Release notes
- Fixes bug where IAM roles that were created through the AWS console could not be passed to the single-servermodule because of duplicate instance profile. Allows disabling the creation of instance profile internally inside the module.
Published: 7/28/2022 | Modules affected: landingzone/account-baseline-app, landingzone/account-baseline-root, landingzone/account-baseline-security | Release notes
- Unlock AWS provider v4. Require minimum 3.75.1 just for Landing Zone modules. This update includes a few tests that make sure upgrading to this module from the last release is easy. However, you may need to bump your AWS provider version. See the migration guide notes below for more info.
Published: 7/28/2022 | Modules affected: base/ec2-baseline, services/ec2-instance, mgmt/jenkins, mgmt/bastion-host | Release notes
- Exposed the ability to specify tags on ecs-clusterresources.
- Updated ARN references to dynamically look up the AWS partition information to support alternative partitions.
- Updated dependencies:- terraform-aws-security:- v0.65.6=>- v0.65.8
- Default version of terraforminjenkins:v1.2.3=>v1.2.4
 
- Updated test dependencies.
Published: 7/27/2022 | Modules affected: data-stores/aurora, data-stores/rds, data-stores/ecr-repos, mgmt/tailscale-subnet-router | Release notes
- Added documentation for a hidden parameter lifecycle_policy_rulesfor ECR Repos.
- Added documentation for a hidden parameter taintsfor Managed Node Groups.
- Added support for specifying a custom security group name for RDS and ECS Services.
- Added support for configuring performance insights on Aurora.
- Updated dependencies:- terraform-aws-asg
- terraform-aws-lambda
- terraform-aws-data-storage
- terraform-aws-vpc
- terraform-aws-ci
 
Published: 7/26/2022 | Modules affected: s3-cloudfront, s3-static-website | Release notes
- Added support for associating CloudFront functions with the CloudFront distribution managed with the s3-cloudfrontmodule.
- Updated the website S3 bucket with additional security configurations when operating in private bucket mode:- The bucket will now configure blocking of public access for the objects.
- The bucket will now enforce encryption of data in transit (only accessible over TLS).
 
Published: 7/25/2022 | Modules affected: s3-cloudfront | Release notes
- Adds cloudfront_distribution_domain_nameas output var
Published: 7/7/2022 | Modules affected: network-acl-inbound, network-acl-outbound, port-range-calculator, vpc-app-network-acls | Release notes
- Added a new input variable exclude_ports_from_inbound_allthat can be used to exclude a list of ports from the inbound global CIDR rules in the network acl modules. This is useful for adhering to certain compliance standards like CIS that explicitly deny any allow rule for administrative ports.
Published: 7/7/2022 | Modules affected: vpc-flow-logs | Release notes
- Removed the log:CreateLogGrouppermissions from the VPC Flow Logs. This was unnecessary as the Log Groups are managed in Terraform, and in fact can lead to a race condition where the Log Group gets recreated after deletion.