Releases: cloudposse/terraform-aws-cloudfront-s3-cdn
Releases · cloudposse/terraform-aws-cloudfront-s3-cdn
0.21.0 Add website mode to use S3 static website as origin
what
- option added to have website mode to use S3 static website as origin
why
- Use S3 static website as origin is much better to serve entire website
referenses
- see #73 description
0.20.0 Allow disabling the logging bucket
what
- Allow disabling the logging bucket
why
- Allow using the CDN module and have an option to not create a logging S3 bucket
0.19.0 Empty `alias` if no `acm_certificate_arn` given
what
- Empty
alias
if noacm_certificate_arn
given
why
- If we give
alias
but not giveacm_certificate_arn
, the following error will be thrown:
Error: error creating CloudFront Distribution: InvalidViewerCertificate: To add an alternate domain name (CNAME) to a CloudFront distribution, you must attach a trusted certificate that validates your authorization to use the domain name. For more details, see: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/CNAMEs.html#alternate-domain-names-requirements
0.18.0 Fix IPv6 variables. Change AWS region for tests. Fix `enabled` logic. Update LICENSE
what
- Fix IPv6 variables
- Change AWS region for tests
- Fix
enabled
logic - Use
terraform-null-label
instead ofterraform-terraform-label
- Update LICENSE
why
- Duplicate
ipv6_enabled
variables - we need only one flag - We use
us-east-2
region for Terratest now (us-west-1
is very limited region) enabled
logic formodule "dns"
was wrongterraform-null-label
has more features and works without issues in TF 0.12
0.17.0 Add optional support for IPv6 DNS records
what
- Add optional support for IPv6 DNS records
why
- Allow creating IPv6 DNS records for the CloudFront distribution
related
- Closes #64
0.16.0 Make `ssl_support_method` empty when using CloudFront default certificate
what
- Make
ssl_support_method
empty when using CloudFront default certificate
why
- The current implementation always uses "sni-only" as
ssl_support_method
inviewer_certificate
configuration.
According to Terraform documentation this option is required only when usingacm_certificate_arn
oriam_certificate_id
.
This leads to a situation where Terraform tries to setssl_support_method
to "sni-only" at each run spending several time trying to do it (~10 minutes) without effectively setting anything (it doesn't fail though).
With this commit we check the value ofacm_certificate_arn
and set the properssl_support_method
only if such value is defined and not if we are using CloudFront default certificate
0.15.1 Fix link to examples in README
what
- Fix link to examples in README
why
- Dead link
0.15.0 Add support for website config on origin
what
- Add support for website config on origin
why
- Configure S3 origin as Static website hosting
related
- Closes #14
0.14.0 Add AES256 Server Side Encryption
what
- Add AES256 Server Side Encryption
why
- Allow to encrypt s3 buckets even when not entirely necessary just for uniformity for security audits
related
- Closes #54
0.13.0 Add `aliases` to outputs
what
- Add
aliases
to outputs
why
- In the CORS settings of some other modules, it would be nice to easily get all aliases that a CF distribution made through this module controls
related
- Closes #56