chore(deps): update terraform cloudposse/lambda-function/aws to v0.5.3 (main) #13
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.3.2->0.5.3Release Notes
cloudposse/terraform-aws-lambda-function (cloudposse/lambda-function/aws)
v0.5.3Compare Source
fix: Allow for custom_iam_policy_arns that are unknown at apply @natemccurdy (#46)
what
Replace the
toset()in theaws_iam_role_policy_attachmentresource'sfor_eachattribute with a map of name:ARN pairs.why
Prior to this patch, specifying
custom_iam_policy_arnsfor IAM Policies that do not exist yet and would be created in the same Terraform run that creates the Lambda Execution Role would cause the following error:This is due to the ARN's of those policies not being known at apply time and the usage of
toset()in theaws_iam_role_policy_attachmentresource'sfor_eachparameter. As the set's values are unknown at apply time, Terraform can't create a dependency graph.references
Similar issues with similar fixes in other CloudPosse modules:
🚀 Enhancements
fix: Add null/label context tags to the aws_lambda_function resource @natemccurdy (#44)
What
Use
tags = module.this.tagson theaws_lambda_functionresource.Why
Prior to this, the
aws_lambda_functionresource was not getting tagged at allwhen passing just the null/label context into the module.
For example, this would end up with a completely untagged Lambda function even
though I am passing the context from a standard null/label declaration:
To get any tags on the lambda, the
tagsattribute must be used:This has a couple of problems:
attributeslist is missing from the resultant set of tags.tagsattribute is not how other CloudPosse modules work.Outcome
aws_lambda_functionresource is tagged with the implicit tags passed in viacontext.tagsvariable are still present, but are now merged with the tags fromcontext.v0.5.2Compare Source
🚀 Enhancements
fix: Add context tags to the IAM resources @natemccurdy (#45)
what
Add
tags = module.this.tagsto each of the IAM resources so that they use the tags determined by the null/labelcontextor thetagsinput.why
Prior to this, the
aws_iam_roleand theaws_iam_policycreated by this module did not include any of the tags passed viatagsor viacontext.v0.5.1Compare Source
🚀 Enhancements
fix: addresses issues with lambda cloudwatch log group @Gowiem (#39)
what
why
references
v0.5.0Compare Source
Add ephemeral storage size option @drselump14 (#31)
What
ephemeral_storage_sizeevent_source_mappingsignore_external_function_updatessns_subscriptionscloudwatch_event_rulescloudwatch_log_subscription_filtersWhy
Sync github @max-lobur (#37)
Rebuild github dir from the template
Fix link to examples in readme @sindrig (#25)
what
v0.4.1Compare Source
🚀 Enhancements
Update module versions, examples and tests @aknysh (#24)
what
why
v0.4.0Compare Source
ignore last_modified attribute @codekitchen (#23)
what
last_modifiedattribute of theaws_lambda_functionresourcewhy
In the past I've used this module with a local
filenamewithout issue, but we just used it with a new lambda function whose code we are storing externally in S3 so using thes3_key/s3_bucketattributes, and on every terraform apply it wants to update thelast_modifiedattribute e.g.:Adding this lifecycle rule avoids this spurious update. I'm open to other suggestions though!
v0.3.6Compare Source
🚀 Enhancements
patch: Fix lambda role logic @jamengual (#18)
what
why
v0.3.5Compare Source
🚀 Enhancements
Always add lambda.amazonaws.com id @nitrocode (#17)
what
why
references
v0.3.4Compare Source
🚀 Enhancements
Attach VPC and XRay Roles when needed @jamengual (#16)
what
why
references
v0.3.3Compare Source
Added dead_letter_config @3h4x (#15)
what
why
git.io->cloudposse.tools update @dylanbannon (#12)
what and why
Change all references to
git.io/build-harnessintocloudposse.tools/build-harness, sincegit.ioredirects will stop working on April 29th, 2022.References
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.