Skip to content

Releases: cloudposse/terraform-aws-cloudfront-s3-cdn

0.29.0: Add existing cloudfront origin access identity (#93)

29 Jul 14:59
97b9f6d
Compare
Choose a tag to compare
* Update main.tf

* cloudfront_origin_access_identity_path

* Update variables.tf

* Updated README.md

Co-authored-by: actions-bot <[email protected]>

0.28.0

29 Jul 14:54
94af7d9
Compare
Choose a tag to compare
add output value to expose internal logs module in so that the logs (…

0.27.0: Fix log version error (#89)

19 Jul 03:22
1e134a1
Compare
Choose a tag to compare

0.26.0: feat: Allow specifing custom origins (#78)

27 Jun 18:15
a1ad726
Compare
Choose a tag to compare

what

  • allow specifing/creating (additional) custom origins

why

  • This module is really useful for front-end website deployments but sometimes it is required to use the same domain for front-end and back-end (different paths) or add some back-end functionality to front-end website without creating real back-end
  • To configure API Gateway easily
  • We already have the ability to configure ordered_cache_behaviour so we technically support multiple strategies for different paths

references

example usage

module "cloudfront-s3" {
# ...
  ordered_cache = [{
    target_origin_id            = "api-gateway-with-lambda"
    path_pattern                = "/v1/lambda"
    allowed_methods             = ["HEAD", "GET"]
    cached_methods              = ["HEAD", "GET"]
    compress                    = true
    viewer_protocol_policy      = "redirect-to-https"
    min_ttl                     = 0
    default_ttl                 = 60
    max_ttl                     = 3600
    forward_header_values       = []
    forward_query_string        = true
    forward_cookies             = "none"
    lambda_function_association = []
  }]

  custom_origins = [{
    domain_name = "xxxxxxxxxx.execute-api.us-east-1.amazonaws.com"
    origin_id   = "api-gateway-with-lambda"
    origin_path = null
    custom_origin_config = {
      http_port                = 80
      https_port               = 443
      origin_protocol_policy   = "https-only"
      origin_ssl_protocols     = ["TLSv1.2"]
      origin_keepalive_timeout = 5
      origin_read_timeout      = 30
    }
  }]
}

0.25.0: Update bucket logging module version (#82)

27 Jun 17:42
f7907f3
Compare
Choose a tag to compare

what

  • Add compatibility with the latest label module's version

why

  • s3 bucket module has the same name in different environment

0.24.0: Fixes issue with multiple `cors_allowed_origins`

23 Jun 21:51
e84f466
Compare
Choose a tag to compare

what

  • We now dynamically generate the cors rules block so we correctly create a block for each alias/allowed origin.

why

  • CORS origins don't work without these changes
  • I believe this change makes them work as intended in the original module

references

0.23.2: Fix tests to use randomized bucket name

23 Jun 18:59
613bd3f
Compare
Choose a tag to compare

what

  • Updates terratests to add unique attribute to randomize bucket name

why

  • Fixes test failures mentioned in #84

references

0.23.1 Fix `trusted_signers` in ordered cache

27 Feb 20:26
556d06e
Compare
Choose a tag to compare

what

  • Fix trusted_signers in ordered cache

why

  • bug with wrong value expression

0.23.0 Make it optional to override the origin s3 policy

25 Feb 21:31
493d99d
Compare
Choose a tag to compare

what

  • Make it optional to override the origin s3 policy

why

  • When specifying var.origin_bucket, it can be nice to leave the existing bucket's policy as is. For example, when manage an s3 bucket that multiple CloudFront dists use as their origin (without paths, they just use the same code). In this case, we may not want to restrict the bucket to only talk to a single CF dist, as this module does by default.

0.22.0 S3 website domain name delimiter fix

24 Feb 17:43
41c6c33
Compare
Choose a tag to compare

what

  • Fix the issue mentioned in #74

why

  • wrong domain name being generated for some regions