Releases: Cox-Automotive/terraform-provider-alks
Releases · Cox-Automotive/terraform-provider-alks
1.3.1
This release includes:
- The
enable_alks_access
flag now updates resources in place
1.3.0
This release includes:
- Support for Terraform 0.12
1.2.2
This release includes:
- Support for ECS container credentials
- Improved error reporting
- Provider will now properly detect missing IAM roles (enabling commands like
terraform refresh
)
1.2.1
This Release Includes:
- Bug fix: Roles created prior to the 1.1.0 release will no longer
ForceNew
1.2.0
1.1.0
1.1.0 Release
1.0.0
This release includes:
- Cross account roles
- Updates provider to Terraform 0.10.0 provider spec and changes versioning style
- Adds improved error messaging in place of the gnarly "Please validate your username/password and account/role" error
0.9.11.1
This updates adds the following improvements:
- Removes username/password authentication
- Removes the requirement for specifying the ALKS account and role
- Adds support for authentication using STS tokens the same way that the AWS provider does
- Adds multiple STS authentication options including tokens via environment parameters, hardcoded tokens and AWS profile credentials
- Improves error reporting
0.9.11
This updates adds the following improvements:
- macOS Keychain support: If you have the ALKS CLI installed and have run
alks developer configure
then you only need to supply your username to ALKS. The provider will look up your password in the Keychain. Be sure to click "Always Allow" when prompted by Keychain. Thanks @devinsba - Validate credentials and ALKS account/role during
terraform plan
andterraform apply
: This means you'll now be alterted to invalid credentials or accounts prior to attempting to provision the new infrastructure. - Return instance profile ARN: This was previously returned incorrectly formatted.
- Improved error messaging (duplicate role names, etc)
0.9.0
Dropped a space, oops.