Skip to content

Releases: DNXLabs/terraform-aws-client-vpn

0.11.0

26 Aug 02:22
946efb6
Compare
Choose a tag to compare

What’s Changed

Mark outputted keys as sensitive @toMeloos (#22) The module is failing on Terraform 1.0 because as of 0.14 sensitive outputs must be marked as such. This PR aims to fix that.

To reduce the risk of accidentally exporting sensitive data that was intended to be only internal, Terraform requires that any root module output containing sensitive data be explicitly marked as sensitive, to confirm your intent. If you do intend to export this data, annotate the output value as sensitive by adding the sensitive = true argument.

Types of changes

What types of changes does your code introduce to <repo_name>?
Put an x in the boxes that apply

  • Bugfix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Documentation Update (if none of the other choices apply)

Checklist

Put an x in the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.

  • I have read the CONTRIBUTING.md doc.
  • I have added necessary documentation (if appropriate).
  • Any dependent changes have been merged and published in downstream modules.

Further comments

Full Terragrunt error log:

│ Error: Output refers to sensitive values
│ 
│   on _outputs.tf line 10:
│   10: output "vpn_client_key" {
│ 
│ To reduce the risk of accidentally exporting sensitive data that was
│ intended to be only internal, Terraform requires that any root module
│ output containing sensitive data be explicitly marked as sensitive, to
│ confirm your intent.
│ 
│ If you do intend to export this data, annotate the output value as
│ sensitive by adding the following argument:
│     sensitive = true
╵
╷
│ Error: Output refers to sensitive values
│ 
│   on _outputs.tf line 16:
│   16: output "vpn_server_key" {
│ 
│ To reduce the risk of accidentally exporting sensitive data that was
│ intended to be only internal, Terraform requires that any root module
│ output containing sensitive data be explicitly marked as sensitive, to
│ confirm your intent.
│ 
│ If you do intend to export this data, annotate the output value as
│ sensitive by adding the following argument:
│     sensitive = true
╵
╷
│ Error: Output refers to sensitive values
│ 
│   on _outputs.tf line 22:
│   22: output "vpn_ca_key" {
│ 
│ To reduce the risk of accidentally exporting sensitive data that was
│ intended to be only internal, Terraform requires that any root module
│ output containing sensitive data be explicitly marked as sensitive, to
│ confirm your intent.
│ 
│ If you do intend to export this data, annotate the output value as
│ sensitive by adding the following argument:
│     sensitive = true

0.10.0

04 Jul 02:56
0c9a7bf
Compare
Choose a tag to compare

What’s Changed

add aws_ec2_client_vpn_route @Renatovnctavares (#29) Describe the big picture of your changes here to communicate to the maintainers why we should accept this pull request. If it fixes a bug or resolves a feature request, be sure to link to that issue.

Types of changes

What types of changes does your code introduce to <repo_name>?
Put an x in the boxes that apply

  • Bugfix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Documentation Update (if none of the other choices apply)

Checklist

Put an x in the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.

  • I have read the CONTRIBUTING.md doc.
  • I have added necessary documentation (if appropriate).
  • [ x Any dependent changes have been merged and published in downstream modules.

Further comments

If this is a relatively large or complex change, kick off the discussion by explaining why you chose the solution you did and what alternatives you considered, etc...

0.9.0

07 Jun 01:32
db71c69
Compare
Choose a tag to compare

What’s Changed

Feature/self service portal @brunodasilvalenga (#33) Include saml for self service portal

0.8.0

22 May 21:17
244f92f
Compare
Choose a tag to compare

What’s Changed

Add azure_diretory_id @caiovfernandes (#32) Describe the big picture of your changes here to communicate to the maintainers why we should accept this pull request. If it fixes a bug or resolves a feature request, be sure to link to that issue.

Types of changes

What types of changes does your code introduce to <repo_name>?
Put an x in the boxes that apply

  • Bugfix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Documentation Update (if none of the other choices apply)

Checklist

Put an x in the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.

  • I have read the CONTRIBUTING.md doc.
  • I have added necessary documentation (if appropriate).
  • Any dependent changes have been merged and published in downstream modules.

Further comments

If this is a relatively large or complex change, kick off the discussion by explaining why you chose the solution you did and what alternatives you considered, etc...

0.7.0

06 Mar 04:49
c67482f
Compare
Choose a tag to compare

What’s Changed

Added options for managing connection authorization for new client connections @alexandrealvao (#30) Allow to use of an AWS Lambda function that is invoked synchronously by the service (after user and device authentication) when a new VPN session connection is attempted by an end user. The Lambda function can be customized to enforce the security policies of the enterprise.

Types of changes

What types of changes does your code introduce to <repo_name>?
Put an x in the boxes that apply

  • Bugfix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Documentation Update (if none of the other choices apply)

Checklist

Put an x in the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.

  • I have read the CONTRIBUTING.md doc.
  • I have added necessary documentation (if appropriate).
  • Any dependent changes have been merged and published in downstream modules.

Further comments

0.6.0

19 Apr 06:15
ab1ab16
Compare
Choose a tag to compare

What’s Changed

ISSUE #25 Adds VPC ID in client VPN endpoint argument @adeelamin15 (#26) Solves the issue reported https://github.com//issues/25

Types of changes

  • Bugfix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Documentation Update (if none of the other choices apply)

Checklist

  • I have read the CONTRIBUTING.md doc.
  • I have added necessary documentation (if appropriate).
  • Any dependent changes have been merged and published in downstream modules.

Further comments

This fix is necessary to get main upstream repo working. As of now the present upstream branch is broken.

0.5.0

21 Mar 12:43
4534f8c
Compare
Choose a tag to compare

What’s Changed

Fix/warning @mcosta1105 (#24) Updated security group ids argument to remove the warning below.
Warning: Argument is deprecated

with module.vpn[0].aws_ec2_client_vpn_network_association.default[0],
on modules/terraform-aws-client-vpn/vpn-endpoint.tf line 34, in resource "aws_ec2_client_vpn_network_association" "default":
34:   security_groups        = [var.security_group_id == "" ? aws_security_group.default[0].id : var.security_group_id]

Use the `security_group_ids` attribute of the `aws_ec2_client_vpn_endpoint` resource instead.

Types of changes

What types of changes does your code introduce to <repo_name>?
Put an x in the boxes that apply

  • Bugfix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Documentation Update (if none of the other choices applies)

Checklist

Put an x in the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.

  • I have read the CONTRIBUTING.md doc.
  • I have added the necessary documentation (if appropriate).
  • Any dependent changes have been merged and published in downstream modules.

Further comments

If this is a relatively large or complex change, kick off the discussion by explaining why you chose the solution you did and what alternatives you considered, etc...

0.4.2

19 Oct 01:14
492c22d
Compare
Choose a tag to compare

What's Changed

  • Remove key_algorithm and ca_key_algorithm parameter from resources by @olialvesrobson in #21

0.4.1

14 Sep 03:32
8b6052e
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: 0.4.0...0.4.1

0.4.0

07 Apr 03:42
03dab95
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: 0.3.0...0.4.0