Skip to content

Releases: rhythmictech/terraform-aws-cloudtrail-bucket

v4.0.1

14 Jun 22:26
99ec535
Compare
Choose a tag to compare

What's Changed

Full Changelog: v4.0.0...v4.0.1

v4.0.0

04 Mar 18:01
00c5cd6
Compare
Choose a tag to compare

Full Changelog: v3.0.0...v4.0.0

Removed the bucket ACL after AWS' deprecation

v3.0.0

29 Feb 18:05
4289df9
Compare
Choose a tag to compare

What's Changed

Full Changelog: v2.0.0...v3.0.0

v2.0.0

23 Dec 16:25
46b3350
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v1.3.1...v2.0.0

fix bug introduced in v1.3.0

13 Oct 01:15
358e91d
Compare
Choose a tag to compare

1.3.0 introduced roles_allowed_kms_decrypt, which allows you to specify IAM roles that can read CloudTrail logs in S3. When empty, this would error out. Used override_json to fix.

v1.3.0: Merge pull request #6 from wojukasz/master

05 Aug 22:50
9e2f2b4
Compare
Choose a tag to compare
Allowing roles to use KMS:decrypt to allow reading logs from s3

Update docs

06 Mar 14:50
5ff8801
Compare
Choose a tag to compare
v1.2.0

formatting, docs (#3)

Cross-account Support

17 Feb 16:17
b81d1d4
Compare
Choose a tag to compare

Added the ability to grant external accounts write access to the CloudTrail bucket, suitable for aggregating CloudTrail logs in a multi-account strategy.

Breaking Changes: Many resource names were changed to improve consistency. Check your plan carefully when upgrading to this module, and use terraform state mv to rename objects as needed.

v1.0.0: Remove hardcoded tags and clean up module (#1)

14 Jan 17:03
1ce86a5
Compare
Choose a tag to compare
* Remove hardcoded tags and clean up module

* cleanup