Skip to content

Releases: ministryofjustice/cloud-platform-terraform-sqs

v5.0.0

04 Sep 09:35
2f25e7d
Compare
Choose a tag to compare

What's Changed

Full Changelog: 4.12.0...5.0.0

v4.12.0

21 Aug 13:09
f672c94
Compare
Choose a tag to compare

What's Changed

Full Changelog: 4.11.0...4.12.0

v4.11.0

05 May 07:48
747c409
Compare
Choose a tag to compare

What's Changed

  • Add output for IAM policy arn for use in IRSA configuration by @mattops in #46

New Contributors

Full Changelog: 4.10.1...4.11.0

4.10.1

30 Mar 15:43
99e7836
Compare
Choose a tag to compare

Set output sensitive values

What's Changed

Full Changelog: 4.10.0...4.10.1

4.10.0

23 Feb 16:42
16e47ea
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: 4.9.1...4.10.0

v4.9.1

15 Dec 15:11
64be2c1
Compare
Choose a tag to compare

What's Changed

Full Changelog: 4.9...4.9.1

4.9

13 Dec 13:33
01a6d64
Compare
Choose a tag to compare
4.9

Aws provider upgrade

v4.8

13 Jul 14:41
411a305
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: 4.7...4.8

4.7

28 Jun 11:26
39a3f35
Compare
Choose a tag to compare
4.7

This is to fix the error when no principal for "Allow cross-account use of the key"

Fix the below error:
MalformedPolicyDocumentException:Policy contains a statement with no principal

4.6

27 Jun 12:23
92b2e51
Compare
Choose a tag to compare
4.6

This adds a variable kms_external_access, which expects a list of ARNs referring to IAM principals (e.g. accounts, users, roles). E.g.

kms_external_access = ["arn:aws:iam::111111111111:root", "arn:aws:iam::222222222222:role/my-role"]
An added statement on the KMS policy allows those IAM principals to kms: Decrypt the messages that they read from the queue.