Releases: ministryofjustice/cloud-platform-terraform-sqs
v5.0.0
What's Changed
- Fix output for irsa_policy_arn by @jakemulley in #60
- Remove access keys by @jakemulley in #59
Full Changelog: 4.12.0...5.0.0
v4.12.0
What's Changed
- Refactor .github/ directory by @jakemulley in #47
- Refactor README, variables, versions by @jakemulley in #51
- Standardise tags to snake_case rather than kebab-case by @jakemulley in #54
- Standardise tags and versions by @jakemulley in #55
- Update README by @jakemulley in #56
- Standardise variable inputs and add comments for easier code navigation by @jakemulley in #57
- Automatically set the queue name if fifo_queue is true, add extra configuration for FIFO queues by @jakemulley in #58
Full Changelog: 4.11.0...4.12.0
v4.11.0
4.10.1
Set output sensitive values
What's Changed
- Set outputs to sensitive for sqs module by @sj-williams in #45
Full Changelog: 4.10.0...4.10.1
4.10.0
What's Changed
- fix: update example release by @sj-williams in #40
- Add gh action to push new terraform module releases to our API by @jaskaransarkaria in #42
- Upgrade terraform version to >= 1.2.5 by @AntonyBishop in #43
- Bump GitHub Action TF version to >= 1.2.5 by @jasonBirchall in #44
New Contributors
- @sj-williams made their first contribution in #40
- @jaskaransarkaria made their first contribution in #42
- @AntonyBishop made their first contribution in #43
Full Changelog: 4.9.1...4.10.0
v4.9.1
What's Changed
- Update sqs.tf by @vijay-veeranki in #38
- Allow TagResource and UntagResource from current account by @jakemulley in #39
Full Changelog: 4.9...4.9.1
4.9
Aws provider upgrade
v4.8
What's Changed
- Allow encryption of SQS messages from external accounts by @marcus-bcl in #34
- Remove unused
aws_region
data call by @jakemulley in #35 - Remove unused
aws_region
variable by @jakemulley in #36
New Contributors
- @jakemulley made their first contribution in #35
Full Changelog: 4.7...4.8
4.7
This is to fix the error when no principal for "Allow cross-account use of the key"
Fix the below error:
MalformedPolicyDocumentException:Policy contains a statement with no principal
4.6
This adds a variable kms_external_access, which expects a list of ARNs referring to IAM principals (e.g. accounts, users, roles). E.g.
kms_external_access = ["arn:aws:iam::111111111111:root", "arn:aws:iam::222222222222:role/my-role"]
An added statement on the KMS policy allows those IAM principals to kms: Decrypt the messages that they read from the queue.