Releases: idealo/terraform-aws-mwaa
Releases · idealo/terraform-aws-mwaa
v1.3.0
v1.2.0
v1.1.2
1.1.2 (2022-03-10)
Features
- Allow logging config (#58) (actual changes in #62)
- Allow passing the ARN of customer managed KMS key (CMK) as
kms_key_arn
for data encryption. Must be the same key as used by the S3 bucket passed as source_bucket_arn, if that bucket used KMS. If no CMK ARN is given, the behavior is the same as before (module version <= 1.0.1)
Bug Fixes
v1.1.1
v1.1.0
v1.0.1
Same functionality as 1.0.0
Creates a managed IAM policy for the MWAA execution role rather than an inline policy. This turned out to not help with the security issues, but rather generate different or even more warnings. This is reverted in release 1.1.0 (which is broken because of other issues). So better use 1.0.0 or jump to to 1.1.2 which allows you to create your own KMS key and pass its ARN to this module.
1.0.1 (2022-03-10)
Bug Fixes
- INA-1987: address Trusted Advisor recommendation to not specify broad KMS permission in inline policy (285ee3e), see https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards-fsbp-controls.html#fsbp-kms-2