Skip to content

Latest commit

 

History

History
114 lines (66 loc) · 4.55 KB

CHANGELOG.md

File metadata and controls

114 lines (66 loc) · 4.55 KB

Changes

1.0.0

  • BREAKING: Upgrade all Terraform code to version 0.12.
  • Add apigateway:UpdateRestApiPolicy permission to support newer versions of serverless.

0.8.8

  • Additional permissions needed to allow teardown of Serverless CloudFormation stack. Add ec2:DescribeNetworkInterfaces to vpc/policy-developer. Add s3:DeleteBucketPolicy to policy-admin.

0.8.7

  • Add iam:DeleteRolePolicy to cd-lambdas IAM policy for folks transitioning from old SLS roles (named the same).

0.8.6

  • Add s3:PutBucketPolicy to -admin IAM group to match new Serverless CloudFormation requirements.

0.8.5

0.8.4

  • Very minor var -> local fixes. #60

0.8.3

  • Fixes IAM permissions for the canary plugin. #59

0.8.2

  • Fixes Terraform 0.12 support by using explicit count.index in group attachments. #57

0.8.1

  • Fixes an incorrect IAM ARN for lambda execution roles. #57

0.8.0

  • Adds an option to disable group and group attachment creation. #56

0.7.0

  • Generates a new IAM role by default to use instead of the default Serverless-generated role. This solves an issue where terraform-aws-serverless failed to attach policies to the Serverless-generated role when the user hasn't run sls deploy before. #54

0.6.0

  • Submodule: Add canary submodule support for serverless apps.
  • Add group IAM policy ARNs to outputs in all modules. This allows a user to create an IAM role that mirrors the policies attached to groups, which in turn allows for delegation to group users or other AWS accounts.

0.5.3

  • Add support for Lambda Layers creation via normal Serverless-controlled layers. #48

0.5.2

  • BUG: More permissions needed for tested version [email protected]. #49
    • Add apigateway:PATCH permission to -developer.

0.5.1

  • Set an empty default for iam_stage to avoid prompting the user.

0.5.0

  • Add an iam_stage option to allow for stage wildcards in IAM permissions.

0.4.0

  • Adds a lambda_role_name option to allow use of a custom Lambda execution role in lieu of the default Serverless-generated role.

0.3.0

  • Submodule: Add vpc submodule support for serverless apps. #10
  • Internal: Add tf_group_ROLE_name helper locals.

0.2.3

  • BUG: Add more IAM permissions after serverless framework introduced default S3 bucket encryption in serverless/serverless#5800. Note if you have an existing serverless deployment, after updating the Terraform support stack you will need to run an admin user serverless deploy to properly set the encryption configuration for subsequent developer|ci deploys. #33

0.2.2

  • Add IAM group name outputs for admind|developer|ci. #34

0.2.1

  • Move cloudformation:List|Get permissions to developer|ci policy since they're limited already to sls_cloudformation_arn. #26

0.2.0

  • Adds opt_many_lambdas option to allow Lambda function create/delete privileges for the developer|ci groups to facilitate application development around many independent functions. #29
  • Lock down lambda:CreateFunction to sls_lambda_arn.
  • Expand logs:DescribeLogGroups to wildcard-like sls_log_stream_all_arn. Needed for create-then-delete-then-create... scenario for functions.

0.1.1

  • Adds role_*_name option to name IAM groups, policies, etc. besides default admin|developer|ci.

0.1.0

  • Module: Core IAM support for serverless framework.
  • Submodule: AWS X-ray support for serverless apps.