Releases: rhythmictech/terraform-aws-cloudtrail-bucket
Releases · rhythmictech/terraform-aws-cloudtrail-bucket
v4.0.1
v4.0.0
Full Changelog: v3.0.0...v4.0.0
Removed the bucket ACL after AWS' deprecation
v3.0.0
v2.0.0
What's Changed
- [pre-commit.ci] pre-commit autoupdate by @pre-commit-ci in #10
- lifecycle policies, v4 of aws provider, and new ci by @sblack4 in #12
New Contributors
- @pre-commit-ci made their first contribution in #10
- @sblack4 made their first contribution in #12
Full Changelog: v1.3.1...v2.0.0
fix bug introduced in v1.3.0
1.3.0 introduced roles_allowed_kms_decrypt
, which allows you to specify IAM roles that can read CloudTrail logs in S3. When empty, this would error out. Used override_json
to fix.
v1.3.0: Merge pull request #6 from wojukasz/master
Allowing roles to use KMS:decrypt to allow reading logs from s3
Update docs
v1.2.0 formatting, docs (#3)
Cross-account Support
Added the ability to grant external accounts write access to the CloudTrail bucket, suitable for aggregating CloudTrail logs in a multi-account strategy.
Breaking Changes: Many resource names were changed to improve consistency. Check your plan carefully when upgrading to this module, and use terraform state mv
to rename objects as needed.
v1.0.0: Remove hardcoded tags and clean up module (#1)
* Remove hardcoded tags and clean up module * cleanup