feat: Add variable create_lambda_permission in notification module #302
+18
−10
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
In the Notification module create a new variable a new
create_lambda_policy
that functions similar tocreate_sqs_policy
andcreate_sns_policy
Motivation and Context
I define and manage my Lambda Policy separate from the Terraform where I manage my S3 Notifications. I don't want this module to force me to manage the Lambda policy here.
Fixes #301
Breaking Changes
I think that migrating
aws_lambda_permission.allow
from a single to acount
this will cause the Resource to be recreated.This can be avoided by performing
terraform state mv
There are 3 types of notifications, and this change brings Lambda in line with SQS and SNS that support
create_sqs_policy
andcreate_sns_policy
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request