Releases: silinternational/idp-in-a-box
Releases · silinternational/idp-in-a-box
Change RDS CA Cert Identifier
Changed
- Changed default CA Cert Identifier for RDS. This is not a breaking change because all RDS connections are not using HTTPS (all connections are internal to the VPC).
fix id-broker cron task not running when AppConfig is enabled
Fixed
- Fixed id-broker cron task failing to get AppConfig data. Added the task role to the cron task definition.
expanded use of AWS AppConfig
Added
- Added AppConfig to pw-manager, ssp, and id-sync
- New module
ecs-role
for creating an ECS Assume Role, used by each ECS service or task
Changed
- Deprecated
app_id
andenv_id
variables on id-broker, replaced byappconfig_app_id
andappconfig_env_id
Fix database module
Fixed
- Added back the db-users.sql file that was accidentally deleted in 12.4.0
Add heartbeat monitoring config
Added
- Added
HEARTBEAT_URL
andHEARTBEAT_METHOD
variables to id-sync module. These can be used to notify a monitoring service on each successful sync run.
add AppConfig configuration to id-broker module
Added
- Added optional management of AppConfig application and environment in 000-core
- Added optional management of AppConfig configuration profile and ECS assume role in 040-id-broker
Option to use Transit Gateway
Added
- Added an option to use a Transit Gateway
Removed
- Removed
aws_region
as a required variable
New variable alerts_email_enabled in 050-pw-manager
Added
- Added new variable
alerts_email_enabled
to050-pw-manager
module
Changed
- Changed docker-compose
db-ssp
image fromsilintl/mariadb:latest
tomariadb:10
add support for provided.al2 Lambda runtime
Added
- Added variable
lambda_runtime
to add support for provided.al2 runtime
id-sync scheduled task, email by SES, remove 2 ECR repos
Changelog
Added
- Added id-sync scheduled ECS task
- Added an ECS task role to the email-service module for sending email using SES
- Added
SENTRY_MONITOR_SLUG
environment variable to id-sync task definition
Changed
- Made email-service SMTP variables optional
Removed
- Removed id-sync ECS service
- Removed id-sync load balancer target group and listener rule
- Removed
email-service
anddb-backup
ECR repositories. We never add any layers to the public Docker image in these modules. They can always use the public images (silintl/email-service
andsilintl/mysql-backup-restore
).
Note: idp-id-sync version 5.0.0 is required
Upgrade procedure
Terraform configuration
Required
- Manually remove all images from the email-service and db-backup ECR repositories. Terraform will not destroy repositories containing images.
- In each instance of the
031-email-service
module, provide a Docker image to thedocker_image
input. Example:"silintl/email-service:${var.image_tag}"
. If you use this example, create a new variableimage_tag
. - In each instance of the
032-db-backup
module, provide a Docker image to thedocker_image
input. Example:"silintl/mysql-backup-restore:${var.image_tag}"
. If you use this example, create a new variableimage_tag
. - In each instance of the
070-id-sync
module, remove these inputs:alb_https_listener_arn
,subdomain
,cloudflare_domain
, ecsServiceRole_arn, and
alb_dns_name` and any variables or resources that may be used to feed these inputs. - Remove any reference to the
idsync_url
andaccess_token_external
outputs of070-id-sync
.
Recommended
- In each instance of the
031-email-service
module, remove themailer_host
,mailer_password
, andmailer_username
inputs to begin using AWS SES rather than SMTP. Ensure thefrom_email
variable is set to an email address that has been verified in SES. - In each instance of the
040-id-broker
module, provide a Docker image to thedocker_image
input. Example:"silintl/idp-id-broker:${var.image_tag}"
. If you use this example, create a new variableimage_tag
. This may not be possible if a custom image is needed, such as to include Google credentials. - In each instance of the
050-pw-manager
module, provide a Docker image to thedocker_image
input. Example:"silintl/idp-pw-api:${var.image_tag}"
. If you use this example, create a new variableimage_tag
. This may not be possible if a custom image is needed, such as to include a custom password store configuration. - In each instance of the
070-id-sync
module, provide a Docker image to thedocker_image
input. Example:"silintl/idp-id-sync:${var.image_tag}"
. If you use this example, create a new variableimage_tag
. This may not be possible if a custom image is needed, such as to include Google credentials. - In each instance of the
070-id-sync
module, add a new input,event_schedule
, containing the desired CloudWatch event schedule, e.g."cron(*/5 * * * ? *)"
Service upgrade
Ensure that your id-sync service is running version 5 of silinternational/idp-id-sync, which will not work properly with previous versions of idp-in-a-box. To coordinate the Terraform configuration changes with the service change, it is recommended to set enable_sync
to false
in the Terraform configuration before beginning the upgrade. After Terraform has finished updating infrastructure and version 5 of idp-id-sync has been deployed, enable_sync
can be set back to true
.