Releases: terraform-ibm-modules/terraform-ibm-landing-zone-vpc
Releases · terraform-ibm-modules/terraform-ibm-landing-zone-vpc
v7.1.0
7.1.0 (2023-05-05)
Features
- add the ability to remove all rules from the default VPC security group (using variable
clean_default_security_group
) (#516) (0a575f4) - add the ability to remove all rules from the default VPC ACL (using variable
clean_default_acl
) (#516) (0a575f4)
NOTES:
- Both of these features are optional. If
clean_default_security_group
orclean_default_acl
are set to true, then a value must be passed foribmcloud_api_key
. It also means the runtime must have the ibmcloud cli and the vpc-infrastructure[infrastructure-service/is] plugin installed - Removal of VPC default rules is not supported by the IBM Terraform provider at this time, so the rules are removed using a back-end command. You will not see the removal of default rules in either Terraform plan or in the Terraform logs.
v7.0.1
v7.0.0
7.0.0 (2023-04-18)
Bug Fixes
- use_manual_address_prefixes input variable has been removed
BREAKING CHANGES
- Removed the input variable
use_manual_address_prefixes
. The value of this variable is now computed by the module based on theaddress_prefixes
input variable. Ifaddress_prefixes
variable is set, then the modules determine that manual address prefix are used.
Note: in the event that use_manual_address_prefix=false
(the default value) AND address_prefixes
was specified, the VPC and everything deployed into it will be destroyed and it will be recreated when moving up to this version. To avoid this - BEFORE upgrading to this version of the module - set use_manual_address_prefix
to true, and apply the change (terraform apply
). You are now ready to upgrade to the new version without ending up in a VPC deletion.
v6.0.1
v6.0.0
6.0.0 (2023-04-12)
Bug Fixes
- The
network_connections
option has been removed from thenetwork_acls
variable as it was not being used in the code (#488) (276e463)
BREAKING CHANGES
- If you are upgrading to this version, and you have the
network_connections
option in thenetwork_acls
variable, it should be removed. There is no functional impact as this variable was not used.
v5.2.0
v5.1.0
v5.0.1
v5.0.0
5.0.0 (2023-03-15)
Bug Fixes
BREAKING CHANGES
- If you were consuming the module using the default value for var.network_acls and upgraded to this version, the
allow-all-443-inbound
andallow-all-443-outbound
ACL rules will be removed since opening 0.0.0.0/0 is not FsCloud compliant.