Update Terraform cloudposse/lambda-function/aws to v0.5.3 (main) - autoclosed #2
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.3.2
->0.5.3
Release Notes
cloudposse/terraform-aws-lambda-function (cloudposse/lambda-function/aws)
v0.5.3
Compare Source
fix: Allow for custom_iam_policy_arns that are unknown at apply @natemccurdy (#46)
what
Replace the
toset()
in theaws_iam_role_policy_attachment
resource'sfor_each
attribute with a map of name:ARN pairs.why
Prior to this patch, specifying
custom_iam_policy_arns
for IAM Policies that do not exist yet and would be created in the same Terraform run that creates the Lambda Execution Role would cause the following error:This is due to the ARN's of those policies not being known at apply time and the usage of
toset()
in theaws_iam_role_policy_attachment
resource'sfor_each
parameter. As the set's values are unknown at apply time, Terraform can't create a dependency graph.references
Similar issues with similar fixes in other CloudPosse modules:
🚀 Enhancements
fix: Add null/label context tags to the aws_lambda_function resource @natemccurdy (#44)
What
Use
tags = module.this.tags
on theaws_lambda_function
resource.Why
Prior to this, the
aws_lambda_function
resource was not getting tagged at allwhen passing just the null/label context into the module.
For example, this would end up with a completely untagged Lambda function even
though I am passing the context from a standard null/label declaration:
To get any tags on the lambda, the
tags
attribute must be used:This has a couple of problems:
attributes
list is missing from the resultant set of tags.tags
attribute is not how other CloudPosse modules work.Outcome
aws_lambda_function
resource is tagged with the implicit tags passed in viacontext
.tags
variable are still present, but are now merged with the tags fromcontext
.v0.5.2
Compare Source
🚀 Enhancements
fix: Add context tags to the IAM resources @natemccurdy (#45)
what
Add
tags = module.this.tags
to each of the IAM resources so that they use the tags determined by the null/labelcontext
or thetags
input.why
Prior to this, the
aws_iam_role
and theaws_iam_policy
created by this module did not include any of the tags passed viatags
or viacontext
.v0.5.1
Compare Source
🚀 Enhancements
fix: addresses issues with lambda cloudwatch log group @Gowiem (#39)
what
why
references
v0.5.0
Compare Source
Add ephemeral storage size option @drselump14 (#31)
What
ephemeral_storage_size
event_source_mappings
ignore_external_function_updates
sns_subscriptions
cloudwatch_event_rules
cloudwatch_log_subscription_filters
Why
Sync github @max-lobur (#37)
Rebuild github dir from the template
Fix link to examples in readme @sindrig (#25)
what
v0.4.1
Compare Source
🚀 Enhancements
Update module versions, examples and tests @aknysh (#24)
what
why
v0.4.0
Compare Source
ignore last_modified attribute @codekitchen (#23)
what
last_modified
attribute of theaws_lambda_function
resourcewhy
In the past I've used this module with a local
filename
without issue, but we just used it with a new lambda function whose code we are storing externally in S3 so using thes3_key
/s3_bucket
attributes, and on every terraform apply it wants to update thelast_modified
attribute e.g.:Adding this lifecycle rule avoids this spurious update. I'm open to other suggestions though!
v0.3.6
Compare Source
🚀 Enhancements
patch: Fix lambda role logic @jamengual (#18)
what
why
v0.3.5
Compare Source
🚀 Enhancements
Always add lambda.amazonaws.com id @nitrocode (#17)
what
why
references
v0.3.4
Compare Source
🚀 Enhancements
Attach VPC and XRay Roles when needed @jamengual (#16)
what
why
references
v0.3.3
Compare Source
Added dead_letter_config @3h4x (#15)
what
why
git.io->cloudposse.tools update @dylanbannon (#12)
what and why
Change all references to
git.io/build-harness
intocloudposse.tools/build-harness
, sincegit.io
redirects will stop working on April 29th, 2022.References
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.