Releases: aws-ia/terraform-aws-control_tower_account_factory
Releases Β· aws-ia/terraform-aws-control_tower_account_factory
1.10.2
- Bugfix: Fix issue with DynamoDB replica creation preventing AFT deployment
- Conflicting replica definitions in the aft-backend- DynamoDB table caused a creation collision in some cases. This change introduces a pattern that is robust to this problem.
Please note that some situations cause replicas to not exist on initial terraform apply
. If replicas for the aft-backend-<AFT-MGMT-ACCOUNT-ID>
DynamoDB table are not present after an initial apply, rerun terraform apply
1.10.1
- Bugfix: Resolve an issue with 1.10.0 where AFT backend DynamoDB table replica would show a perpetual change of state and get re-created on every alternate run of Terraform apply
- Bugfix: Resolve an issue where no target accounts were identified when targeting a nested OU which shared the same OU name as another nested OU under a different parent OU
1.10.0
- AFT is now supported in
us-west-1
and the opt-in regions:me-south-1
,af-south-1
,eu-south-1
, andap-east-1
.- Some required VPC endpoints are not currently available in
me-south-1
. When deploying AFT tome-south-1
, you must set theaft_vpc_endpoints
parameter tofalse
.
- Some required VPC endpoints are not currently available in
- AFT now supports single-region deployments without a secondary-region backup by omitting the
secondary_region
parameter.- Note that
me-south-1
,af-south-1
, andap-east-1
do not currently support DynamoDB table replicas; when deploying AFT with one of these regions as the primary region, thesecondary_region
parameter must be omitted
- Note that
- Amazon S3 now automatically enables S3 Block Public Access and disables the use of access control lists for all newly created buckets. Due to this change, the ACLs applied to AFT buckets have been removed.
- The minimum version for the
hashicorp/aws
provider has been updated to4.27.0
.
1.9.2
- Update CodeBuild projects to use the
aws/codebuild/amazonlinux2-x86_64-standard:4.0
image due to the deprecation of theaws/codebuild/amazonlinux2-x86_64-standard:3.0
image on April 30th 2023. - Upgrade Python version to 3.9 in all AFT components as the new
amazonlinux2-x86_64-standard:4.0
container image does not distribute Python 3.8.
1.9.1
1.9.0
- Customization request tracing - AFT now includes both the target account ID and a unique request ID in logs emitted during during Lambda-based account customization workflows. AFT also provisions 2 new CloudWatch Log Insights queries that can be used to find logs related to a customization request by the account ID or the customization request ID. These queries reduce troubleshooting effort by making it easier to identify where a failure is occurring.
- Concurrent account provisioning - AFT now supports provisioning new AWS accounts concurrently. The maximum concurrency is configurable via the new
concurrent_account_factory_actions
parameter. (default: 5, the default limit for AWS Control Tower Account Factory concurrent provisioning). - Remove unneeded Lambda Layer dependencies, reducing build processing time by ~20%
- Bugfix: AFT now ignores unsupported Control Tower Events instead of sending failure notifications to the SNS topic
- Bugfix: Resolve an issue where the βaft-customizations-get-pipeline-executionsβ Lambda function did not have permissions to emit exceptions to the failure SNS topic.
1.8.0
- Add resource cleanup behavior - AFT now deletes the customization pipeline and metadata record for an account when its request file is removed from the account request repo.
- Use consistent S3 Block Public Access settings for AFT buckets.
- Bugfix: Targeting suspended or non-existent accounts with the
aft-invoke-customizations
step function no longer causes the customization workflow to fail. These accounts now generate a warning in the logs but are otherwise ignored. - Bugfix: The account provisioning workflow no longer fails when any Account Factory provisioned product is in a
Tainted
state without a prior successful event. - Bugfix: Mitigate an issue that causes the account customization workflow to fail when an account record is present in the metadata table but has been removed from the account request table.
- The new cleanup behavior prevents this issue from newly occurring, but does not resolve failures caused by de-synchronized metadata records that already exist.
- Bugfix: Fix case-sensitive email comparisons throughout AFT.
- Bugfix: Resolve authorization errors that appeared in AFT logs without affecting functionality.
1.7.0
- Optimize the
aft-account-provisioning-framework
to address network throttling errors that occurred during concurrent executions, typically caused by targeting a large number of accounts using theaft-invoke-customizations
step function interface.- Note that this change removes the
aft-account-provisioning-framework-validate-request
andaft-account-provisioning-framework-get-account-info
step function stages and related resources.
- Note that this change removes the
- Use the -no-color flag when calling Terraform actions to avoid creating shell color-code artifacts in AFT log groups
1.6.7
-
AFT is now supported in GovCloud
- AFT is unable to vend accounts on your behalf in GovCloud.
- To create new member accounts please do the following:
- Create an account following https://docs.aws.amazon.com/govcloud-us/latest/UserGuide/getting-started-sign-up.html
- Enroll the account in your GovCloud Control Tower environment, https://docs.aws.amazon.com/controltower/latest/userguide/enroll-account.html
- To manage them with AFT, please follow https://docs.aws.amazon.com/controltower/latest/userguide/aft-update-account.html
-
Note, To provision AFT in GovCloud you must:
- Disable VPC Endpoints during deployment by setting
aft_vpc_endpoint
tofalse
. - Configure your AFT deployments home region to PDT by setting
ct_home_region
tous-gov-west-1
- Configure the AFT deployments secondary region to OSU by setting
tf_backend_secondary_region
tous-gov-east-1
- Disable VPC Endpoints during deployment by setting