Skip to content

Releases: cloudposse/terraform-aws-vpc-peering

v1.0.0

21 Jun 11:55
196fdf7
Compare
Choose a tag to compare
Support AWS Provider V5 @max-lobur (#48)

what

Support AWS Provider V5
Linter fixes

why

Maintenance

references

https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.0.0

Sync github @max-lobur (#46)

Rebuild github dir from the template

v0.11.0

17 May 09:04
c9316cb
Compare
Choose a tag to compare
  • No changes

v0.10.0

02 Nov 20:33
c9316cb
Compare
Choose a tag to compare
Add/ignore cidr blocks @colinh6 (#43)

what

  • This PR will introduce logic to ignore certain CIDR ranges from either the requestor or acceptor VPC(s), without affecting the existing functionality.

why

  • We add the CIDR range 100.64.0.0/16 to each of our EKS cluster VPCs to increase the maximum amount of assignable IP addresses when using the AWS VPC CNI.
  • This causes issues when attempting to leverage this existing peering module, as the 100.64.0.0/16 routes will conflict in certain cases.
  • One specific case is where we want to peer and route a single database or elasticsearch VPC to multiple different EKS cluster VPCs that all contain the 100.64.0.0/16 additional CIDR association

references

git.io->cloudposse.tools update @dylanbannon (#38)

what and why

Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.

References

  • DEV-143

v0.9.2

20 Jan 01:46
0960878
Compare
Choose a tag to compare

🚀 Enhancements

Remove unused and deprecated `template` provider @sapslaj (#37)

what

  • Removes the template provider from required_providers

why

  • The template provider is deprecated by Hashicorp.
  • Said provider appears to be unused in this module (it works perfectly fine without it).
  • Trying to run Terraform on an M1 Mac with this module results in an error since the template provider does not have a darwin_arm64 build.

references

v0.9.1

20 Nov 03:06
4e0c23e
Compare
Choose a tag to compare

🤖 Automatic Updates

Update context.tf @cloudpossebot (#36)

what

This is an auto-generated PR that updates the context.tf file to the latest version from cloudposse/terraform-null-label

why

To support all the features of the context interface.

v0.9.0

04 Feb 20:08
47c6e51
Compare
Choose a tag to compare
context.tf updated to v0.24.1, minimum required Terraform version bumped to 0.13.0 when needed, readme updated @maximmi (#31)

what

  • update context.tf to v0.24.1
  • minimum required Terraform version bumped to 0.13.0
  • readme updated, Bridgecrew compliance badges added

why

  • It allows for setting the letter case of tag names and labels, back compatibility with context v0.22.0 and below
  • we have dropped support for Terraform 0.12
  • To be able see and fix the recommendations from Bridgecrew so we can position our modules as standards compliant

Supersedes and closes #29

v0.8.0

04 Feb 07:11
eb8aae0
Compare
Choose a tag to compare
minimum required Terraform version bumped to 0.13.0, context.tf updated, readme updated @maximmi (#30)

what

  • update context.tf to v0.23.0
  • minimum required Terraform version bumped to 0.13.0
  • readme updated, Bridgecrew compliance badges added

why

  • It allows for setting the letter case of tag names and labels
  • we have dropped support for Terraform 0.12
  • To be able see and fix the recommendations from Bridgecrew so we can position our modules as standards compliant

v0.7.0

07 Jan 08:20
c5ef3c0
Compare
Choose a tag to compare
Terraform 0.14 upgrade @maximmi (#28)

what

  • Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard

why

  • Support Terraform 0.14

supersedes and closes #26

0.6.0: Allow filtering route tables using tags (#24)

16 Oct 13:07
a5c1c16
Compare
Choose a tag to compare

what

  • Caller can supply tags for both the acceptor and requestor VPCs, and if present, peering routes will only be added to route tables matching those tags.
  • Default behavior is unchanged.

why

Support environments with private subnets that shouldn't be allowed to communicate with peer VPCs.

0.5.2: Support AWS provider 3.x.x (#23)

13 Oct 12:05
c41bc13
Compare
Choose a tag to compare
## what
* Updates AWS provider pining to be inclusive of 3.x

## why
* Allow users to use AWS provider > 2.x

Co-authored-by: actions-bot <58130806+actions-bot@users.noreply.github.com>