Update Terraform cloudposse/lambda-function/aws to v0.6.1 #268
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.5.1
->0.6.1
Release Notes
cloudposse/terraform-aws-lambda-function (cloudposse/lambda-function/aws)
v0.6.1
Compare Source
🐛 Bug Fixes
Bugfix: Revert Breaking Change in v0.6.0 @milldr (#79)
what
module.this.tags
to cloudwatch module, notmodule.this.context
why
references
🤖 Automatic Updates
Update .github/settings.yml @osterman (#77)
what
.github/settings.yml
.github/auto-release.yml
fileswhy
.github/settings.yml
from org levelreferences
Update .github/settings.yml @osterman (#76)
what
.github/settings.yml
.github/auto-release.yml
fileswhy
.github/settings.yml
from org levelreferences
v0.6.0
Compare Source
Change cloudwatch submodule to pass context @nnsense (#74)
what
A patch to pass the
context
instead of justvars
to the CloudWatch submodule.why
This module is only setting the context
vars
instead of the wholecontext
inside the Cloudwatch submodule, leaving up to the submodule to set its own contex.By settings the
context
(as advised by cloudposse) the root deployment are passed to the submodule, and an upper/camel/pascal casefunction_name
will be consistent with the Cloudwatch group name.references
v0.5.6
Compare Source
Add support for declaring simple lambda permissions in-module @jpalomaki (#69)
what
Allow lambda configuration author to optionally declare
lambda:InvokeFunction
lambda permissions directly in this module.More complex permissions configurations could still be done outside of this module.
why
This co-locates permissions related to the lambda in the module configuration (where we also declare lambda IAM role permissions), which can help a reader understand where the lambda is invoked from, e.g. in cases where the actual event sources are declared in a different root configuration.
In our specific use case, we use terragrunt to deploy the lambda function (straight from terraform registry module), so this feature would also help us avoid having to create a wrapper module just to add the necessary permission resources.
questions
lambda:InvokeFunction
and keep the number of attributes a user has to fill in, small. Does this look like a sane approach (looks like it could cover a lot of ground already, judging by examples)?for_each
is keyed by list index, which isn't ideal, since it would force recreations if items are shuffled/insertedreferences
Slack discussion, cc/ @osterman
🤖 Automatic Updates
Update .github/settings.yml @osterman (#70)
what
.github/settings.yml
.github/auto-release.yml
fileswhy
.github/settings.yml
from org levelreferences
v0.5.5
Compare Source
Add lambda role name option @gadzooks (#66)
what
why
references
🤖 Automatic Updates
chore(deps): bump the go_modules group in /test/src with 6 updates @dependabot (#67)
Bumps the go_modules group in /test/src with 6 updates:
1.6.1
1.7.5
0.0.0-20210513164829-c07d793c2f9a
0.0.0-20210921155107-089bfa567519
0.0.0-20220127200216-cd36cc0744dd
0.1.0
0.3.7
0.4.0
1.38.0
1.50.1
1.26.0
1.28.1
Updates
github.com/hashicorp/go-getter
from 1.6.1 to 1.7.5Release notes
Sourced from github.com/hashicorp/go-getter's releases.
... (truncated)
Commits
5a63fd9
Merge pull request #497 from hashicorp/fix-git-update5b7ec5f
fetch tags on update and fix tests9906874
recreate git config during update to prevent config alteration268c11c
escape user provide string to git (#483)975961f
Merge pull request #433 from adrian-bl/netrc-fix0298a22
Merge pull request #459 from hashicorp/jbardin/setup-git-envc70d9c9
don't change GIT_SSH_COMMAND if there's no keyfile3d5770f
Merge pull request #458 from hashicorp/tsccr-auto-pinning/trusted/2023-09-180688979
Result of tsccr-helper -log-level=info -pin-all-workflows .e66f244
Merge pull request #454 from hashicorp/tsccr-auto-pinning/trusted/2023-09-11Updates
golang.org/x/crypto
from 0.0.0-20210513164829-c07d793c2f9a to 0.0.0-20210921155107-089bfa567519Commits
Updates
golang.org/x/net
from 0.0.0-20220127200216-cd36cc0744dd to 0.1.0Commits
Updates
golang.org/x/text
from 0.3.7 to 0.4.0Commits
1bdb400
language: remove compatibility with go < 1.2252bee0
go.mod: ignore cyclic dependency for taggingecab6e5
go.mod: ignore cyclic dependency for tagging369c86b
all: fix a few function names on comments434eadc
language: reject excessively large Accept-Language strings23407e7
go.mod: ignore cyclic dependency for taggingb18d3dd
secure/precis: replace bytes.Compare with bytes.Equal795e854
all: replace io/ioutil with io and os packageb0ca10f
internal/language: bump script types to uint16 and update registryba9b0e1
go.mod: update x/tools to HEADUpdates
google.golang.org/grpc
from 1.38.0 to 1.50.1Release notes
Sourced from google.golang.org/grpc's releases.
... (truncated)
Commits
4c776ec
Cherry-pick observability changes from master to v1.50.x and update version t...6576007
Change version to 1.50.1-dev (#5686)c1d7d7a
Change version to 1.50.0 (#5685)1451c62
internal/transport: optimize grpc-message encoding/decoding (#5654)be4b63b
test: minor test cleanup (#5679)d83070e
Changed Outlier Detection Env Var to default true (#5673)54521b2
client: remove trailing null from unix abstract socket address (#5678)36e4810
orca: cleanup old code, and get grpc package to use new code (#5627)e8866a8
build: harden GitHub Workflow permissions (#5660)8458251
xdsclient: ignore routes with cluster_specifier_plugin when GRPC_EXPERIMENTAL...Updates
google.golang.org/protobuf
from 1.26.0 to 1.28.1Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditionsYou can disable automated security fix PRs for this repo from the Security Alerts page.
v0.5.4
Compare Source
Add support for inline IAM policy @jpalomaki (#68)
what
Adds support for attaching an inline IAM policy to the function IAM role.
why
Useful for defining a (simple) IAM policy that is declared, and deployed, in-tandem with the Lambda function itself.
Our use case: we use terragrunt to deploy a simple function using this module (straight out of terraform registry), so we'd like to avoid having to create a wrapper module or a separate customer-managed policy, for adding some necessary (but simple) permissions.
references
No related GitHub issue (but I can create one if needed).
🐛 Bug Fixes
Use runtime node20 @kevcube (#58)
Node14 no longer supported, tests fail because of this
🤖 Automatic Updates
Update release workflow to allow pull-requests: write @osterman (#65)
what
.github/workflows/release.yaml
) to have permission to comment on PRwhy
Update GitHub Workflows to use shared workflows from '.github' repo @osterman (#63)
what
.github/workflows
) to use shared workflows from.github
repowhy
Update GitHub Workflows to Fix ReviewDog TFLint Action @osterman (#61)
what
.github/workflows
) to addissue: write
permission needed by ReviewDogtflint
actionwhy
Update GitHub workflows @osterman (#60)
what
.github/workflows/settings.yaml
)why
Use GitHub Action Workflows from `cloudposse/.github` Repo @osterman (#56)
what
why
cldouposse/.github
repositoryAdd GitHub Settings @osterman (#51)
what
.github/settings.yaml
)why
Update Scaffolding @osterman (#49)
what
make readme
to rebuildREADME.md
fromREADME.yaml
why
.github
repov0.5.3
Compare Source
fix: Allow for custom_iam_policy_arns that are unknown at apply @natemccurdy (#46)
what
Replace the
toset()
in theaws_iam_role_policy_attachment
resource'sfor_each
attribute with a map of name:ARN pairs.why
Prior to this patch, specifying
custom_iam_policy_arns
for IAM Policies that do not exist yet and would be created in the same Terraform run that creates the Lambda Execution Role would cause the following error:This is due to the ARN's of those policies not being known at apply time and the usage of
toset()
in theaws_iam_role_policy_attachment
resource'sfor_each
parameter. As the set's values are unknown at apply time, Terraform can't create a dependency graph.references
Similar issues with similar fixes in other CloudPosse modules:
🚀 Enhancements
fix: Add null/label context tags to the aws_lambda_function resource @natemccurdy (#44)
What
Use
tags = module.this.tags
on theaws_lambda_function
resource.Why
Prior to this, the
aws_lambda_function
resource was not getting tagged at allwhen passing just the null/label context into the module.
For example, this would end up with a completely untagged Lambda function even
though I am passing the context from a standard null/label declaration:
To get any tags on the lambda, the
tags
attribute must be used:This has a couple of problems:
attributes
list is missing from the resultant set of tags.tags
attribute is not how other CloudPosse modules work.Outcome
aws_lambda_function
resource is tagged with the implicit tags passed in viacontext
.tags
variable are still present, but are now merged with the tags fromcontext
.v0.5.2
Compare Source
🚀 Enhancements
fix: Add context tags to the IAM resources @natemccurdy (#45)
what
Add
tags = module.this.tags
to each of the IAM resources so that they use the tags determined by the null/labelcontext
or thetags
input.why
Prior to this, the
aws_iam_role
and theaws_iam_policy
created by this module did not include any of the tags passed viatags
or viacontext
.Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.