- BREAKING: Upgrade all Terraform code to version
0.12. - Add
apigateway:UpdateRestApiPolicypermission to support newer versions ofserverless.
- Additional permissions needed to allow teardown of Serverless CloudFormation stack. Add
ec2:DescribeNetworkInterfacestovpc/policy-developer. Adds3:DeleteBucketPolicytopolicy-admin.
- Add
iam:DeleteRolePolicytocd-lambdasIAM policy for folks transitioning from old SLS roles (named the same).
- Add
s3:PutBucketPolicyto-adminIAM group to match new Serverless CloudFormation requirements.
- Add support for tagged resources in Serverless. FormidableLabs/aws-lambda-serverless-reference#41
- Very minor var -> local fixes. #60
- Fixes IAM permissions for the canary plugin. #59
- Fixes Terraform 0.12 support by using explicit
count.indexin group attachments. #57
- Fixes an incorrect IAM ARN for lambda execution roles. #57
- Adds an option to disable group and group attachment creation. #56
- Generates a new IAM role by default to use instead of the default Serverless-generated role. This solves an issue where
terraform-aws-serverlessfailed to attach policies to the Serverless-generated role when the user hasn't runsls deploybefore. #54
- Submodule: Add
canarysubmodule support forserverlessapps. - Add group IAM policy ARNs to outputs in all modules. This allows a user to create an IAM role that mirrors the policies attached to groups, which in turn allows for delegation to group users or other AWS accounts.
- Add support for Lambda Layers creation via normal Serverless-controlled
layers. #48
- BUG: More permissions needed for tested version
serverless@1.45.1. #49- Add
apigateway:PATCHpermission to-developer.
- Add
- Set an empty default for
iam_stageto avoid prompting the user.
- Add an
iam_stageoption to allow for stage wildcards in IAM permissions.
- Adds a
lambda_role_nameoption to allow use of a custom Lambda execution role in lieu of the default Serverless-generated role.
- Submodule: Add
vpcsubmodule support forserverlessapps. #10 - Internal: Add
tf_group_ROLE_namehelperlocals.
- BUG: Add more IAM permissions after
serverlessframework introduced default S3 bucket encryption in serverless/serverless#5800. Note if you have an existing serverless deployment, after updating the Terraform support stack you will need to run anadminuser serverless deploy to properly set the encryption configuration for subsequentdeveloper|cideploys. #33
- Add IAM group name outputs for
admind|developer|ci. #34
- Move
cloudformation:List|Getpermissions todeveloper|cipolicy since they're limited already tosls_cloudformation_arn. #26
- Adds
opt_many_lambdasoption to allow Lambda function create/delete privileges for thedeveloper|cigroups to facilitate application development around many independent functions. #29 - Lock down
lambda:CreateFunctiontosls_lambda_arn. - Expand
logs:DescribeLogGroupsto wildcard-likesls_log_stream_all_arn. Needed for create-then-delete-then-create... scenario for functions.
- Adds
role_*_nameoption to name IAM groups, policies, etc. besides defaultadmin|developer|ci.
- Module: Core IAM support for
serverlessframework. - Submodule: AWS X-ray support for
serverlessapps.