Skip to content

Commit 2368d42

Browse files
feat!: Upgrade min AWS provider and Terraform versions to 6.0 and 1.5.7 respectively (#256)
Co-authored-by: Anton Babenko <[email protected]>
1 parent 73cee96 commit 2368d42

File tree

8 files changed

+20
-28
lines changed

8 files changed

+20
-28
lines changed

README.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -63,20 +63,20 @@ See the [functions](https://github.com/terraform-aws-modules/terraform-aws-notif
6363

6464
| Name | Version |
6565
|------|---------|
66-
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 |
67-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 4.8 |
66+
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.7 |
67+
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 6.0 |
6868

6969
## Providers
7070

7171
| Name | Version |
7272
|------|---------|
73-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 4.8 |
73+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 6.0 |
7474

7575
## Modules
7676

7777
| Name | Source | Version |
7878
|------|--------|---------|
79-
| <a name="module_lambda"></a> [lambda](#module\_lambda) | terraform-aws-modules/lambda/aws | 6.8.0 |
79+
| <a name="module_lambda"></a> [lambda](#module\_lambda) | terraform-aws-modules/lambda/aws | 8.0.1 |
8080

8181
## Resources
8282

@@ -104,7 +104,6 @@ See the [functions](https://github.com/terraform-aws-modules/terraform-aws-notif
104104
| <a name="input_create_sns_topic"></a> [create\_sns\_topic](#input\_create\_sns\_topic) | Whether to create new SNS topic | `bool` | `true` | no |
105105
| <a name="input_enable_sns_topic_delivery_status_logs"></a> [enable\_sns\_topic\_delivery\_status\_logs](#input\_enable\_sns\_topic\_delivery\_status\_logs) | Whether to enable SNS topic delivery status logs | `bool` | `false` | no |
106106
| <a name="input_hash_extra"></a> [hash\_extra](#input\_hash\_extra) | The string to add into hashing function. Useful when building same source path for different functions. | `string` | `""` | no |
107-
| <a name="input_iam_policy_path"></a> [iam\_policy\_path](#input\_iam\_policy\_path) | Path of policies to that should be added to IAM role for Lambda Function | `string` | `null` | no |
108107
| <a name="input_iam_role_boundary_policy_arn"></a> [iam\_role\_boundary\_policy\_arn](#input\_iam\_role\_boundary\_policy\_arn) | The ARN of the policy that is used to set the permissions boundary for the role | `string` | `null` | no |
109108
| <a name="input_iam_role_name_prefix"></a> [iam\_role\_name\_prefix](#input\_iam\_role\_name\_prefix) | A unique role name beginning with the specified prefix | `string` | `"lambda"` | no |
110109
| <a name="input_iam_role_path"></a> [iam\_role\_path](#input\_iam\_role\_path) | Path of IAM role to use for Lambda Function | `string` | `null` | no |
@@ -126,7 +125,7 @@ See the [functions](https://github.com/terraform-aws-modules/terraform-aws-notif
126125
| <a name="input_putin_khuylo"></a> [putin\_khuylo](#input\_putin\_khuylo) | Do you agree that Putin doesn't respect Ukrainian sovereignty and territorial integrity? More info: https://en.wikipedia.org/wiki/Putin_khuylo! | `bool` | `true` | no |
127126
| <a name="input_recreate_missing_package"></a> [recreate\_missing\_package](#input\_recreate\_missing\_package) | Whether to recreate missing Lambda package if it is missing locally or not | `bool` | `true` | no |
128127
| <a name="input_reserved_concurrent_executions"></a> [reserved\_concurrent\_executions](#input\_reserved\_concurrent\_executions) | The amount of reserved concurrent executions for this lambda function. A value of 0 disables lambda from being triggered and -1 removes any concurrency limitations | `number` | `-1` | no |
129-
| <a name="input_runtime"></a> [runtime](#input\_runtime) | Lambda Function runtime | `string` | `"python3.11"` | no |
128+
| <a name="input_runtime"></a> [runtime](#input\_runtime) | Lambda Function runtime | `string` | `"python3.13"` | no |
130129
| <a name="input_slack_channel"></a> [slack\_channel](#input\_slack\_channel) | The name of the channel in Slack for notifications | `string` | n/a | yes |
131130
| <a name="input_slack_emoji"></a> [slack\_emoji](#input\_slack\_emoji) | A custom emoji that will appear on Slack messages | `string` | `":aws:"` | no |
132131
| <a name="input_slack_username"></a> [slack\_username](#input\_slack\_username) | The username that will appear on Slack messages | `string` | n/a | yes |

examples/cloudwatch-alerts-to-slack/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,15 +60,15 @@ Note that this example may create resources which can cost money. Run `terraform
6060

6161
| Name | Version |
6262
|------|---------|
63-
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 |
64-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 4.8 |
63+
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.7 |
64+
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 6.0 |
6565
| <a name="requirement_random"></a> [random](#requirement\_random) | >= 2.0 |
6666

6767
## Providers
6868

6969
| Name | Version |
7070
|------|---------|
71-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 4.8 |
71+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 6.0 |
7272
| <a name="provider_random"></a> [random](#provider\_random) | >= 2.0 |
7373

7474
## Modules

examples/cloudwatch-alerts-to-slack/versions.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
terraform {
2-
required_version = ">= 1.0"
2+
required_version = ">= 1.5.7"
33

44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = ">= 4.8"
7+
version = ">= 6.0"
88
}
99
random = {
1010
source = "hashicorp/random"

examples/notify-slack-simple/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,15 @@ Note that this example may create resources which can cost money (AWS Elastic IP
2323

2424
| Name | Version |
2525
|------|---------|
26-
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 |
27-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 4.8 |
26+
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.7 |
27+
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 6.0 |
2828
| <a name="requirement_local"></a> [local](#requirement\_local) | >= 2.0 |
2929

3030
## Providers
3131

3232
| Name | Version |
3333
|------|---------|
34-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 4.8 |
34+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 6.0 |
3535
| <a name="provider_local"></a> [local](#provider\_local) | >= 2.0 |
3636

3737
## Modules

examples/notify-slack-simple/versions.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
terraform {
2-
required_version = ">= 1.0"
2+
required_version = ">= 1.5.7"
33

44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = ">= 4.8"
7+
version = ">= 6.0"
88
}
99
local = {
1010
source = "hashicorp/local"

main.tf

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ locals {
77

88
sns_topic_arn = try(
99
aws_sns_topic.this[0].arn,
10-
"arn:${data.aws_partition.current.id}:sns:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:${var.sns_topic_name}",
10+
"arn:${data.aws_partition.current.id}:sns:${data.aws_region.current.region}:${data.aws_caller_identity.current.account_id}:${var.sns_topic_name}",
1111
""
1212
)
1313

@@ -88,7 +88,7 @@ resource "aws_sns_topic_subscription" "sns_notify_slack" {
8888

8989
module "lambda" {
9090
source = "terraform-aws-modules/lambda/aws"
91-
version = "6.8.0"
91+
version = "8.0.1"
9292

9393
create = var.create
9494

@@ -125,7 +125,6 @@ module "lambda" {
125125
role_permissions_boundary = var.iam_role_boundary_policy_arn
126126
role_tags = var.iam_role_tags
127127
role_path = var.iam_role_path
128-
policy_path = var.iam_policy_path
129128

130129
# Do not use Lambda's policy for cloudwatch logs, because we have to add a policy
131130
# for KMS conditionally. This way attach_policy_json is always true independenty of

variables.tf

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -216,12 +216,6 @@ variable "iam_role_path" {
216216
default = null
217217
}
218218

219-
variable "iam_policy_path" {
220-
description = "Path of policies to that should be added to IAM role for Lambda Function"
221-
type = string
222-
default = null
223-
}
224-
225219
variable "lambda_function_tags" {
226220
description = "Additional tags for the Lambda function"
227221
type = map(string)
@@ -291,5 +285,5 @@ variable "trigger_on_package_timestamp" {
291285
variable "runtime" {
292286
description = "Lambda Function runtime"
293287
type = string
294-
default = "python3.11"
288+
default = "python3.13"
295289
}

versions.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
terraform {
2-
required_version = ">= 1.0"
2+
required_version = ">= 1.5.7"
33

44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = ">= 4.8"
7+
version = ">= 6.0"
88
}
99
}
1010
}

0 commit comments

Comments
 (0)