You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
New release, including breaking change, see below.
* Lambda function URL is now using IAM auth + CloudFront origin access control (oac)
* Bug fix for unverified callback
* **Breaking change**: Step function logs now using vendedlogs namespace, existing user will see new log group
* Add tags and upgrade lambda runtime
* Various improvements to ensure idempotency and avoid cross event contamination.
Copy file name to clipboardExpand all lines: .header.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# terraform-runtask-iam-access-analyzer
2
2
3
-
Use this module to integrate Terraform Cloud Run Tasks with AWS IAM Access Analyzer for policy validation.
3
+
Use this module to integrate HCP Terraform Run Tasks with AWS IAM Access Analyzer for policy validation.
4
4
5
5

6
6
@@ -9,7 +9,7 @@ Use this module to integrate Terraform Cloud Run Tasks with AWS IAM Access Analy
9
9
To use this module you need have the following:
10
10
11
11
1. AWS account and credentials
12
-
2.Terraform Cloud with Run Task entitlement (Business subscription or higher)
12
+
2.HCP Terraform with Run Task entitlement (Business subscription or higher)
13
13
14
14
## Usage
15
15
@@ -19,9 +19,9 @@ To use this module you need have the following:
19
19
make all
20
20
```
21
21
22
-
* Refer to the [module_workspace](./examples/module_workspace/README.md) for steps to deploy this module in Terraform Cloud.
22
+
* Refer to the [module_workspace](./examples/module_workspace/README.md) for steps to deploy this module in HCP Terraform.
23
23
24
-
* After you deployed the [module_workspace](./examples/module_workspace/README.md), navigate to your Terraform Cloud organization, go to Organization Settings > Integrations > Run tasks to find the newly created Run Task.
24
+
* After you deployed the [module_workspace](./examples/module_workspace/README.md), navigate to your HCP Terraform organization, go to Organization Settings > Integrations > Run tasks to find the newly created Run Task.
25
25
26
26
* You can use this run task in any workspace where you have standard IAM resource policy document. Refer to the [demo_workspace](./examples/demo_workspace/README.md) for more details.
Copy file name to clipboardExpand all lines: README.md
+25-12Lines changed: 25 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
<!-- BEGIN_TF_DOCS -->
2
2
# terraform-runtask-iam-access-analyzer
3
3
4
-
Use this module to integrate Terraform Cloud Run Tasks with AWS IAM Access Analyzer for policy validation.
4
+
Use this module to integrate HCP Terraform Run Tasks with AWS IAM Access Analyzer for policy validation.
5
5
6
6

7
7
@@ -10,7 +10,7 @@ Use this module to integrate Terraform Cloud Run Tasks with AWS IAM Access Analy
10
10
To use this module you need have the following:
11
11
12
12
1. AWS account and credentials
13
-
2.Terraform Cloud with Run Task entitlement (Business subscription or higher)
13
+
2.HCP Terraform with Run Task entitlement (Business subscription or higher)
14
14
15
15
## Usage
16
16
@@ -20,9 +20,9 @@ To use this module you need have the following:
20
20
make all
21
21
```
22
22
23
-
* Refer to the [module\_workspace](./examples/module\_workspace/README.md) for steps to deploy this module in Terraform Cloud.
23
+
* Refer to the [module\_workspace](./examples/module\_workspace/README.md) for steps to deploy this module in HCP Terraform.
24
24
25
-
* After you deployed the [module\_workspace](./examples/module\_workspace/README.md), navigate to your Terraform Cloud organization, go to Organization Settings > Integrations > Run tasks to find the newly created Run Task.
25
+
* After you deployed the [module\_workspace](./examples/module\_workspace/README.md), navigate to your HCP Terraform organization, go to Organization Settings > Integrations > Run tasks to find the newly created Run Task.
26
26
27
27
* You can use this run task in any workspace where you have standard IAM resource policy document. Refer to the [demo\_workspace](./examples/demo\_workspace/README.md) for more details.
|[archive_file.runtask_callback](https://registry.terraform.io/providers/hashicorp/archive/latest/docs/data-sources/file)| data source |
159
+
|[archive_file.runtask_edge](https://registry.terraform.io/providers/hashicorp/archive/latest/docs/data-sources/file)| data source |
150
160
|[archive_file.runtask_eventbridge](https://registry.terraform.io/providers/hashicorp/archive/latest/docs/data-sources/file)| data source |
151
161
|[archive_file.runtask_fulfillment](https://registry.terraform.io/providers/hashicorp/archive/latest/docs/data-sources/file)| data source |
152
162
|[archive_file.runtask_request](https://registry.terraform.io/providers/hashicorp/archive/latest/docs/data-sources/file)| data source |
153
163
|[aws_caller_identity.current_account](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
154
164
|[aws_iam_policy.aws_lambda_basic_execution_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy)| data source |
155
165
|[aws_iam_policy_document.runtask_key](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
156
166
|[aws_iam_policy_document.runtask_waf](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
167
+
|[aws_iam_policy_document.runtask_waf_log](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
157
168
|[aws_partition.current_partition](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
158
169
|[aws_region.cloudfront_region](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
159
170
|[aws_region.current_region](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
| <aname="input_deploy_waf"></a> [deploy\_waf](#input\_deploy\_waf)| Set to true to deploy CloudFront and WAF in front of the Lambda function URL |`string`|`false`| no |
170
181
| <aname="input_event_bus_name"></a> [event\_bus\_name](#input\_event\_bus\_name)| EventBridge event bus name |`string`|`"default"`| no |
171
182
| <aname="input_event_source"></a> [event\_source](#input\_event\_source)| EventBridge source name |`string`|`"app.terraform.io"`| no |
183
+
| <aname="input_lambda_architecture"></a> [lambda\_architecture](#input\_lambda\_architecture)| Lambda architecture (arm64 or x86\_64) |`string`|`"x86_64"`| no |
172
184
| <aname="input_lambda_default_timeout"></a> [lambda\_default\_timeout](#input\_lambda\_default\_timeout)| Lambda default timeout in seconds |`number`|`30`| no |
173
185
| <aname="input_lambda_reserved_concurrency"></a> [lambda\_reserved\_concurrency](#input\_lambda\_reserved\_concurrency)| Maximum Lambda reserved concurrency, make sure your AWS quota is sufficient |`number`|`100`| no |
174
186
| <aname="input_name_prefix"></a> [name\_prefix](#input\_name\_prefix)| Name to be used on all the resources as identifier. |`string`|`"aws-ia2"`| no |
175
187
| <aname="input_recovery_window"></a> [recovery\_window](#input\_recovery\_window)| Numbers of day Number of days that AWS Secrets Manager waits before it can delete the secret |`number`|`0`| no |
176
188
| <aname="input_runtask_stages"></a> [runtask\_stages](#input\_runtask\_stages)| List of all supported RunTask stages |`list(string)`| <pre>[<br> "pre_plan",<br> "post_plan",<br> "pre_apply"<br>]</pre> | no |
177
189
| <aname="input_supported_policy_document"></a> [supported\_policy\_document](#input\_supported\_policy\_document)| (Optional) allow list of the supported IAM policy document |`string`|`""`| no |
190
+
| <aname="input_tags"></a> [tags](#input\_tags)| Map of tags to apply to resources deployed by this solution. |`map(any)`|`null`| no |
178
191
| <aname="input_waf_managed_rule_set"></a> [waf\_managed\_rule\_set](#input\_waf\_managed\_rule\_set)| List of AWS Managed rules to use inside the WAF ACL |`list(map(string))`| <pre>[<br> {<br> "metric_suffix": "common",<br> "name": "AWSManagedRulesCommonRuleSet",<br> "priority": 10,<br> "vendor_name": "AWS"<br> },<br> {<br> "metric_suffix": "bad_input",<br> "name": "AWSManagedRulesKnownBadInputsRuleSet",<br> "priority": 20,<br> "vendor_name": "AWS"<br> }<br>]</pre> | no |
179
192
| <aname="input_waf_rate_limit"></a> [waf\_rate\_limit](#input\_waf\_rate\_limit)| Rate limit for request coming to WAF |`number`|`100`| no |
180
193
| <aname="input_workspace_prefix"></a> [workspace\_prefix](#input\_workspace\_prefix)| TFC workspace name prefix that allowed to run this runtask |`string`|`""`| no |
| <aname="output_runtask_hmac"></a> [runtask\_hmac](#output\_runtask\_hmac)| HMAC key value, keep this sensitive data safe |
187
-
| <aname="output_runtask_id"></a> [runtask\_id](#output\_runtask\_id)| The Run Tasks id configured in Terraform Cloud|
188
-
| <aname="output_runtask_url"></a> [runtask\_url](#output\_runtask\_url)| The Run Tasks URL endpoint, you can use this to configure the Run Task setup in Terraform Cloud|
200
+
| <aname="output_runtask_id"></a> [runtask\_id](#output\_runtask\_id)| The Run Tasks id configured in HCP Terraform|
201
+
| <aname="output_runtask_url"></a> [runtask\_url](#output\_runtask\_url)| The Run Tasks URL endpoint, you can use this to configure the Run Task setup in HCP Terraform|
0 commit comments