diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml
index b362de29..7b4e83b2 100644
--- a/.pre-commit-config.yaml
+++ b/.pre-commit-config.yaml
@@ -1,6 +1,6 @@
repos:
- repo: https://github.com/antonbabenko/pre-commit-terraform
- rev: v1.98.1
+ rev: v1.99.4
hooks:
- id: terraform_fmt
- id: terraform_wrapper_module_for_each
diff --git a/README.md b/README.md
index 10cdbe39..825feb28 100644
--- a/README.md
+++ b/README.md
@@ -666,8 +666,8 @@ Q4: What does this error mean - `"We currently do not support adding policies fo
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [external](#requirement\_external) | >= 1.0 |
| [local](#requirement\_local) | >= 1.0 |
| [null](#requirement\_null) | >= 2.0 |
@@ -676,7 +676,7 @@ Q4: What does this error mean - `"We currently do not support adding policies fo
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [external](#provider\_external) | >= 1.0 |
| [local](#provider\_local) | >= 1.0 |
| [null](#provider\_null) | >= 2.0 |
@@ -824,13 +824,14 @@ No modules.
| [policy\_json](#input\_policy\_json) | An additional policy document as JSON to attach to the Lambda Function role | `string` | `null` | no |
| [policy\_jsons](#input\_policy\_jsons) | List of additional policy documents as JSON to attach to Lambda Function role | `list(string)` | `[]` | no |
| [policy\_name](#input\_policy\_name) | IAM policy name. It override the default value, which is the same as role\_name | `string` | `null` | no |
-| [policy\_path](#input\_policy\_path) | Path of policies to that should be added to IAM role for Lambda Function | `string` | `null` | no |
| [policy\_statements](#input\_policy\_statements) | Map of dynamic policy statements to attach to Lambda Function role | `any` | `{}` | no |
| [provisioned\_concurrent\_executions](#input\_provisioned\_concurrent\_executions) | Amount of capacity to allocate. Set to 1 or greater to enable, or set to 0 to disable provisioned concurrency. | `number` | `-1` | no |
| [publish](#input\_publish) | Whether to publish creation/change as new Lambda Function Version. | `bool` | `false` | no |
| [putin\_khuylo](#input\_putin\_khuylo) | Do you agree that Putin doesn't respect Ukrainian sovereignty and territorial integrity? More info: https://en.wikipedia.org/wiki/Putin_khuylo! | `bool` | `true` | no |
+| [quiet\_archive\_local\_exec](#input\_quiet\_archive\_local\_exec) | Whether to disable archive local execution output | `bool` | `true` | no |
| [recreate\_missing\_package](#input\_recreate\_missing\_package) | Whether to recreate missing Lambda package if it is missing locally or not | `bool` | `true` | no |
| [recursive\_loop](#input\_recursive\_loop) | Lambda function recursion configuration. Valid values are Allow or Terminate. | `string` | `null` | no |
+| [region](#input\_region) | Region where the resource(s) will be managed. Defaults to the region set in the provider configuration | `string` | `null` | no |
| [replace\_security\_groups\_on\_destroy](#input\_replace\_security\_groups\_on\_destroy) | (Optional) When true, all security groups defined in vpc\_security\_group\_ids will be replaced with the default security group after the function is destroyed. Set the replacement\_security\_group\_ids variable to use a custom list of security groups for replacement instead. | `bool` | `null` | no |
| [replacement\_security\_group\_ids](#input\_replacement\_security\_group\_ids) | (Optional) List of security group IDs to assign to orphaned Lambda function network interfaces upon destruction. replace\_security\_groups\_on\_destroy must be set to true to use this attribute. | `list(string)` | `null` | no |
| [reserved\_concurrent\_executions](#input\_reserved\_concurrent\_executions) | The amount of reserved concurrent executions for this Lambda Function. A value of 0 disables Lambda Function from being triggered and -1 removes any concurrency limitations. Defaults to Unreserved Concurrency Limits -1. | `number` | `-1` | no |
diff --git a/examples/alias/README.md b/examples/alias/README.md
index c4037dd6..cb8ce50a 100644
--- a/examples/alias/README.md
+++ b/examples/alias/README.md
@@ -19,15 +19,15 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
diff --git a/examples/alias/versions.tf b/examples/alias/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/alias/versions.tf
+++ b/examples/alias/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/async/README.md b/examples/async/README.md
index bfc7647b..b2e53fd3 100644
--- a/examples/async/README.md
+++ b/examples/async/README.md
@@ -19,15 +19,15 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
diff --git a/examples/async/versions.tf b/examples/async/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/async/versions.tf
+++ b/examples/async/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/build-package/README.md b/examples/build-package/README.md
index d26739dd..8f558bc1 100644
--- a/examples/build-package/README.md
+++ b/examples/build-package/README.md
@@ -21,8 +21,8 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
diff --git a/examples/build-package/versions.tf b/examples/build-package/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/build-package/versions.tf
+++ b/examples/build-package/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/code-signing/README.md b/examples/code-signing/README.md
index 6d4317d8..dfa7bfac 100644
--- a/examples/code-signing/README.md
+++ b/examples/code-signing/README.md
@@ -19,15 +19,15 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
@@ -35,7 +35,7 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Source | Version |
|------|--------|---------|
| [lambda](#module\_lambda) | ../../ | n/a |
-| [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
+| [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 5.0 |
## Resources
diff --git a/examples/code-signing/main.tf b/examples/code-signing/main.tf
index b899a401..8b8e9e3e 100644
--- a/examples/code-signing/main.tf
+++ b/examples/code-signing/main.tf
@@ -93,7 +93,7 @@ resource "random_pet" "this" {
module "s3_bucket" {
source = "terraform-aws-modules/s3-bucket/aws"
- version = "~> 3.0"
+ version = "~> 5.0"
bucket_prefix = "${random_pet.this.id}-"
force_destroy = true
diff --git a/examples/code-signing/versions.tf b/examples/code-signing/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/code-signing/versions.tf
+++ b/examples/code-signing/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/complete/README.md b/examples/complete/README.md
index edebc13a..ee0b620e 100644
--- a/examples/complete/README.md
+++ b/examples/complete/README.md
@@ -20,15 +20,15 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
@@ -49,7 +49,7 @@ Note that this example may create resources which cost money. Run `terraform des
| [lambda\_layer\_with\_package\_deploying\_externally](#module\_lambda\_layer\_with\_package\_deploying\_externally) | ../../ | n/a |
| [lambda\_with\_mixed\_trusted\_entities](#module\_lambda\_with\_mixed\_trusted\_entities) | ../../ | n/a |
| [lambda\_with\_provisioned\_concurrency](#module\_lambda\_with\_provisioned\_concurrency) | ../../ | n/a |
-| [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
+| [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 5.0 |
## Resources
diff --git a/examples/complete/main.tf b/examples/complete/main.tf
index d0ae09c8..356d9f3e 100644
--- a/examples/complete/main.tf
+++ b/examples/complete/main.tf
@@ -352,6 +352,8 @@ module "lambda_function_for_each" {
for_each = toset(["dev", "staging", "prod"])
+ region = "us-east-1"
+
function_name = "my-${each.value}"
description = "My awesome lambda function"
handler = "index.lambda_handler"
@@ -459,7 +461,7 @@ resource "random_pet" "this" {
module "s3_bucket" {
source = "terraform-aws-modules/s3-bucket/aws"
- version = "~> 3.0"
+ version = "~> 5.0"
bucket_prefix = "${random_pet.this.id}-"
force_destroy = true
diff --git a/examples/complete/versions.tf b/examples/complete/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/complete/versions.tf
+++ b/examples/complete/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/container-image/README.md b/examples/container-image/README.md
index 3a0a4f47..ecc3e4d3 100644
--- a/examples/container-image/README.md
+++ b/examples/container-image/README.md
@@ -19,8 +19,8 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [docker](#requirement\_docker) | >= 3.0 |
| [random](#requirement\_random) | >= 2.0 |
@@ -28,7 +28,7 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
diff --git a/examples/container-image/main.tf b/examples/container-image/main.tf
index 4db21302..9e0ee33d 100644
--- a/examples/container-image/main.tf
+++ b/examples/container-image/main.tf
@@ -26,7 +26,7 @@ provider "aws" {
provider "docker" {
registry_auth {
- address = format("%v.dkr.ecr.%v.amazonaws.com", data.aws_caller_identity.this.account_id, data.aws_region.current.name)
+ address = format("%v.dkr.ecr.%v.amazonaws.com", data.aws_caller_identity.this.account_id, data.aws_region.current.region)
username = data.aws_ecr_authorization_token.token.user_name
password = data.aws_ecr_authorization_token.token.password
}
diff --git a/examples/container-image/versions.tf b/examples/container-image/versions.tf
index 5b04c7cd..ea997b2d 100644
--- a/examples/container-image/versions.tf
+++ b/examples/container-image/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
docker = {
source = "kreuzwerker/docker"
diff --git a/examples/deploy/README.md b/examples/deploy/README.md
index 86d5e5a5..0e1b52db 100644
--- a/examples/deploy/README.md
+++ b/examples/deploy/README.md
@@ -19,15 +19,15 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
diff --git a/examples/deploy/versions.tf b/examples/deploy/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/deploy/versions.tf
+++ b/examples/deploy/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/event-source-mapping/README.md b/examples/event-source-mapping/README.md
index 60c28525..5575a9ca 100644
--- a/examples/event-source-mapping/README.md
+++ b/examples/event-source-mapping/README.md
@@ -19,15 +19,15 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
diff --git a/examples/event-source-mapping/versions.tf b/examples/event-source-mapping/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/event-source-mapping/versions.tf
+++ b/examples/event-source-mapping/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/multiple-regions/README.md b/examples/multiple-regions/README.md
index 7c09e0b0..4340822a 100644
--- a/examples/multiple-regions/README.md
+++ b/examples/multiple-regions/README.md
@@ -20,16 +20,16 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
-| [aws.us-east-1](#provider\_aws.us-east-1) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
+| [aws.us-east-1](#provider\_aws.us-east-1) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
diff --git a/examples/multiple-regions/versions.tf b/examples/multiple-regions/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/multiple-regions/versions.tf
+++ b/examples/multiple-regions/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/runtimes/README.md b/examples/runtimes/README.md
index fde279e2..58660bc1 100644
--- a/examples/runtimes/README.md
+++ b/examples/runtimes/README.md
@@ -23,8 +23,8 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.2 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [http](#requirement\_http) | >= 3.0 |
| [random](#requirement\_random) | >= 3.0 |
@@ -32,7 +32,7 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [http](#provider\_http) | >= 3.0 |
| [random](#provider\_random) | >= 3.0 |
diff --git a/examples/runtimes/versions.tf b/examples/runtimes/versions.tf
index 6c4e77fa..1ef908d3 100644
--- a/examples/runtimes/versions.tf
+++ b/examples/runtimes/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.2"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/simple-cicd/README.md b/examples/simple-cicd/README.md
index 2edb2e51..c2b31ea5 100644
--- a/examples/simple-cicd/README.md
+++ b/examples/simple-cicd/README.md
@@ -21,8 +21,8 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
diff --git a/examples/simple-cicd/versions.tf b/examples/simple-cicd/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/simple-cicd/versions.tf
+++ b/examples/simple-cicd/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/simple/README.md b/examples/simple/README.md
index bee54ded..5277ac26 100644
--- a/examples/simple/README.md
+++ b/examples/simple/README.md
@@ -19,8 +19,8 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
diff --git a/examples/simple/versions.tf b/examples/simple/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/simple/versions.tf
+++ b/examples/simple/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/triggers/README.md b/examples/triggers/README.md
index c6a6fde9..a3cd6a62 100644
--- a/examples/triggers/README.md
+++ b/examples/triggers/README.md
@@ -20,15 +20,15 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
diff --git a/examples/triggers/versions.tf b/examples/triggers/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/triggers/versions.tf
+++ b/examples/triggers/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/with-efs/README.md b/examples/with-efs/README.md
index 742816ba..b8d43ac6 100644
--- a/examples/with-efs/README.md
+++ b/examples/with-efs/README.md
@@ -20,15 +20,15 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 2.0 |
## Modules
diff --git a/examples/with-efs/versions.tf b/examples/with-efs/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/with-efs/versions.tf
+++ b/examples/with-efs/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/with-vpc-s3-endpoint/README.md b/examples/with-vpc-s3-endpoint/README.md
index 60a93661..8d12d182 100644
--- a/examples/with-vpc-s3-endpoint/README.md
+++ b/examples/with-vpc-s3-endpoint/README.md
@@ -21,15 +21,15 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 3.4 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 5.79 |
+| [aws](#provider\_aws) | >= 6.0 |
| [random](#provider\_random) | >= 3.4 |
## Modules
@@ -38,7 +38,7 @@ Note that this example may create resources which cost money. Run `terraform des
|------|--------|---------|
| [kms](#module\_kms) | terraform-aws-modules/kms/aws | ~> 1.0 |
| [lambda\_s3\_write](#module\_lambda\_s3\_write) | ../../ | n/a |
-| [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
+| [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 5.0 |
| [security\_group\_lambda](#module\_security\_group\_lambda) | terraform-aws-modules/security-group/aws | ~> 4.0 |
| [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 5.0 |
| [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | ~> 5.0 |
diff --git a/examples/with-vpc-s3-endpoint/main.tf b/examples/with-vpc-s3-endpoint/main.tf
index 50faeb21..29de6eba 100644
--- a/examples/with-vpc-s3-endpoint/main.tf
+++ b/examples/with-vpc-s3-endpoint/main.tf
@@ -26,7 +26,7 @@ module "lambda_s3_write" {
environment_variables = {
BUCKET_NAME = module.s3_bucket.s3_bucket_id
- REGION_NAME = data.aws_region.current.name
+ REGION_NAME = data.aws_region.current.region
}
# Let the module create a role for us
@@ -54,7 +54,7 @@ resource "random_pet" "this" {
}
data "aws_ec2_managed_prefix_list" "this" {
- name = "com.amazonaws.${data.aws_region.current.name}.s3"
+ name = "com.amazonaws.${data.aws_region.current.region}.s3"
}
module "vpc" {
@@ -64,7 +64,7 @@ module "vpc" {
name = random_pet.this.id
cidr = "10.0.0.0/16"
- azs = ["${data.aws_region.current.name}a", "${data.aws_region.current.name}b", "${data.aws_region.current.name}c"]
+ azs = ["${data.aws_region.current.region}a", "${data.aws_region.current.region}b", "${data.aws_region.current.region}c"]
# Intra subnets are designed to have no Internet access via NAT Gateway.
intra_subnets = ["10.0.1.0/24", "10.0.2.0/24", "10.0.3.0/24"]
@@ -160,7 +160,7 @@ module "kms" {
module "s3_bucket" {
source = "terraform-aws-modules/s3-bucket/aws"
- version = "~> 3.0"
+ version = "~> 5.0"
bucket_prefix = "${random_pet.this.id}-"
force_destroy = true
diff --git a/examples/with-vpc-s3-endpoint/versions.tf b/examples/with-vpc-s3-endpoint/versions.tf
index 7a4d860b..9344b2c9 100644
--- a/examples/with-vpc-s3-endpoint/versions.tf
+++ b/examples/with-vpc-s3-endpoint/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/examples/with-vpc/README.md b/examples/with-vpc/README.md
index a29f0bb3..0a3bf423 100644
--- a/examples/with-vpc/README.md
+++ b/examples/with-vpc/README.md
@@ -21,8 +21,8 @@ Note that this example may create resources which cost money. Run `terraform des
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 5.79 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [random](#requirement\_random) | >= 2.0 |
## Providers
diff --git a/examples/with-vpc/versions.tf b/examples/with-vpc/versions.tf
index 5cf868aa..9af58496 100644
--- a/examples/with-vpc/versions.tf
+++ b/examples/with-vpc/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
random = {
source = "hashicorp/random"
diff --git a/main.tf b/main.tf
index c67f1bbb..cc7d011a 100644
--- a/main.tf
+++ b/main.tf
@@ -24,6 +24,8 @@ locals {
resource "aws_lambda_function" "this" {
count = local.create && var.create_function && !var.create_layer ? 1 : 0
+ region = var.region
+
function_name = var.function_name
description = var.description
role = var.create_role ? aws_iam_role.lambda[0].arn : var.lambda_role
@@ -170,6 +172,8 @@ resource "aws_lambda_function" "this" {
resource "aws_lambda_layer_version" "this" {
count = local.create && var.create_layer ? 1 : 0
+ region = var.region
+
layer_name = var.layer_name
description = var.description
license_info = var.license_info
@@ -191,6 +195,8 @@ resource "aws_lambda_layer_version" "this" {
resource "aws_s3_object" "lambda_package" {
count = local.create && var.store_on_s3 && var.create_package ? 1 : 0
+ region = var.region
+
bucket = var.s3_bucket
acl = var.s3_acl
key = local.s3_key
@@ -218,12 +224,16 @@ resource "aws_s3_object" "lambda_package" {
data "aws_cloudwatch_log_group" "lambda" {
count = local.create && var.create_function && !var.create_layer && var.use_existing_cloudwatch_log_group ? 1 : 0
+ region = var.region
+
name = coalesce(var.logging_log_group, "/aws/lambda/${var.lambda_at_edge ? "us-east-1." : ""}${var.function_name}")
}
resource "aws_cloudwatch_log_group" "lambda" {
count = local.create && var.create_function && !var.create_layer && !var.use_existing_cloudwatch_log_group ? 1 : 0
+ region = var.region
+
name = coalesce(var.logging_log_group, "/aws/lambda/${var.lambda_at_edge ? "us-east-1." : ""}${var.function_name}")
retention_in_days = var.cloudwatch_logs_retention_in_days
kms_key_id = var.cloudwatch_logs_kms_key_id
@@ -236,6 +246,8 @@ resource "aws_cloudwatch_log_group" "lambda" {
resource "aws_lambda_provisioned_concurrency_config" "current_version" {
count = local.create && var.create_function && !var.create_layer && var.provisioned_concurrent_executions > -1 ? 1 : 0
+ region = var.region
+
function_name = aws_lambda_function.this[0].function_name
qualifier = aws_lambda_function.this[0].version
@@ -249,6 +261,8 @@ locals {
resource "aws_lambda_function_event_invoke_config" "this" {
for_each = { for k, v in local.qualifiers : k => v if v != null && local.create && var.create_function && !var.create_layer && var.create_async_event_config }
+ region = var.region
+
function_name = aws_lambda_function.this[0].function_name
qualifier = each.key == "current_version" ? aws_lambda_function.this[0].version : null
@@ -278,6 +292,8 @@ resource "aws_lambda_function_event_invoke_config" "this" {
resource "aws_lambda_permission" "current_version_triggers" {
for_each = { for k, v in var.allowed_triggers : k => v if local.create && var.create_function && !var.create_layer && var.create_current_version_allowed_triggers }
+ region = var.region
+
function_name = aws_lambda_function.this[0].function_name
qualifier = aws_lambda_function.this[0].version
@@ -299,6 +315,8 @@ resource "aws_lambda_permission" "current_version_triggers" {
resource "aws_lambda_permission" "unqualified_alias_triggers" {
for_each = { for k, v in var.allowed_triggers : k => v if local.create && var.create_function && !var.create_layer && var.create_unqualified_alias_allowed_triggers }
+ region = var.region
+
function_name = aws_lambda_function.this[0].function_name
statement_id_prefix = try(each.value.statement_id, each.key)
@@ -318,6 +336,8 @@ resource "aws_lambda_permission" "unqualified_alias_triggers" {
resource "aws_lambda_event_source_mapping" "this" {
for_each = { for k, v in var.event_source_mapping : k => v if local.create && var.create_function && !var.create_layer && var.create_unqualified_alias_allowed_triggers }
+ region = var.region
+
function_name = aws_lambda_function.this[0].arn
event_source_arn = try(each.value.event_source_arn, null)
@@ -427,6 +447,8 @@ resource "aws_lambda_event_source_mapping" "this" {
resource "aws_lambda_function_url" "this" {
count = local.create && var.create_function && !var.create_layer && var.create_lambda_function_url ? 1 : 0
+ region = var.region
+
function_name = aws_lambda_function.this[0].function_name
# Error: error creating Lambda Function URL: ValidationException
@@ -451,6 +473,8 @@ resource "aws_lambda_function_url" "this" {
resource "aws_lambda_function_recursion_config" "this" {
count = local.create && var.create_function && !var.create_layer && var.recursive_loop == "Allow" ? 1 : 0
+ region = var.region
+
function_name = aws_lambda_function.this[0].function_name
recursive_loop = var.recursive_loop
}
diff --git a/modules/alias/README.md b/modules/alias/README.md
index 4d1871d3..837f8552 100644
--- a/modules/alias/README.md
+++ b/modules/alias/README.md
@@ -115,14 +115,14 @@ module "lambda" {
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 4.9 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 4.9 |
+| [aws](#provider\_aws) | >= 6.0 |
## Modules
diff --git a/modules/alias/versions.tf b/modules/alias/versions.tf
index dbc484ad..f648e20c 100644
--- a/modules/alias/versions.tf
+++ b/modules/alias/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 4.9"
+ version = ">= 6.0"
}
}
}
diff --git a/modules/deploy/README.md b/modules/deploy/README.md
index 3addc40b..7840572e 100644
--- a/modules/deploy/README.md
+++ b/modules/deploy/README.md
@@ -100,8 +100,8 @@ module "lambda" {
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 3.35 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [local](#requirement\_local) | >= 1.0 |
| [null](#requirement\_null) | >= 2.0 |
@@ -109,7 +109,7 @@ module "lambda" {
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 3.35 |
+| [aws](#provider\_aws) | >= 6.0 |
| [local](#provider\_local) | >= 1.0 |
| [null](#provider\_null) | >= 2.0 |
diff --git a/modules/deploy/versions.tf b/modules/deploy/versions.tf
index 5a82f93b..e7881b92 100644
--- a/modules/deploy/versions.tf
+++ b/modules/deploy/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 3.35"
+ version = ">= 6.0"
}
local = {
source = "hashicorp/local"
diff --git a/modules/docker-build/README.md b/modules/docker-build/README.md
index 17e6c972..61476b07 100644
--- a/modules/docker-build/README.md
+++ b/modules/docker-build/README.md
@@ -57,8 +57,8 @@ module "docker_image" {
| Name | Version |
|------|---------|
-| [terraform](#requirement\_terraform) | >= 1.0 |
-| [aws](#requirement\_aws) | >= 4.22 |
+| [terraform](#requirement\_terraform) | >= 1.10 |
+| [aws](#requirement\_aws) | >= 6.0 |
| [docker](#requirement\_docker) | >= 3.5.0 |
| [null](#requirement\_null) | >= 2.0 |
@@ -66,7 +66,7 @@ module "docker_image" {
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 4.22 |
+| [aws](#provider\_aws) | >= 6.0 |
| [docker](#provider\_docker) | >= 3.5.0 |
| [null](#provider\_null) | >= 2.0 |
diff --git a/modules/docker-build/main.tf b/modules/docker-build/main.tf
index 565027f4..559060cb 100644
--- a/modules/docker-build/main.tf
+++ b/modules/docker-build/main.tf
@@ -3,7 +3,7 @@ data "aws_region" "current" {}
data "aws_caller_identity" "this" {}
locals {
- ecr_address = coalesce(var.ecr_address, format("%v.dkr.ecr.%v.amazonaws.com", data.aws_caller_identity.this.account_id, data.aws_region.current.name))
+ ecr_address = coalesce(var.ecr_address, format("%v.dkr.ecr.%v.amazonaws.com", data.aws_caller_identity.this.account_id, data.aws_region.current.region))
ecr_repo = var.create_ecr_repo ? aws_ecr_repository.this[0].id : var.ecr_repo
image_tag = var.use_image_tag ? coalesce(var.image_tag, formatdate("YYYYMMDDhhmmss", timestamp())) : null
ecr_image_name = var.use_image_tag ? format("%v/%v:%v", local.ecr_address, local.ecr_repo, local.image_tag) : format("%v/%v", local.ecr_address, local.ecr_repo)
diff --git a/modules/docker-build/versions.tf b/modules/docker-build/versions.tf
index 454fc7ae..8b20e477 100644
--- a/modules/docker-build/versions.tf
+++ b/modules/docker-build/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 4.22"
+ version = ">= 6.0"
}
docker = {
source = "kreuzwerker/docker"
diff --git a/outputs.tf b/outputs.tf
index 29c47fe1..93624833 100644
--- a/outputs.tf
+++ b/outputs.tf
@@ -6,7 +6,7 @@ output "lambda_function_arn" {
output "lambda_function_arn_static" {
description = "The static ARN of the Lambda Function. Use this to avoid cycle errors between resources (e.g., Step Functions)"
- value = local.create && var.create_function && !var.create_layer ? "arn:${data.aws_partition.current.partition}:lambda:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:function:${var.function_name}" : ""
+ value = local.create && var.create_function && !var.create_layer ? "arn:${data.aws_partition.current.partition}:lambda:${data.aws_region.current.region}:${data.aws_caller_identity.current.account_id}:function:${var.function_name}" : ""
}
output "lambda_function_invoke_arn" {
diff --git a/package.tf b/package.tf
index bbff086c..7f761ef9 100644
--- a/package.tf
+++ b/package.tf
@@ -70,6 +70,7 @@ resource "null_resource" "archive" {
"--timestamp", data.external.archive_prepare[0].result.timestamp
]
command = data.external.archive_prepare[0].result.build_plan_filename
+ quiet = var.quiet_archive_local_exec
}
depends_on = [local_file.archive_plan]
diff --git a/variables.tf b/variables.tf
index c71f68ae..6ea454f6 100644
--- a/variables.tf
+++ b/variables.tf
@@ -46,6 +46,12 @@ variable "putin_khuylo" {
default = true
}
+variable "region" {
+ description = "Region where the resource(s) will be managed. Defaults to the region set in the provider configuration"
+ type = string
+ default = null
+}
+
###########
# Function
###########
@@ -584,14 +590,6 @@ variable "attach_policies" {
default = false
}
-# TODO: DEPRECATED: Remove this variable in the next major version
-# tflint-ignore: all
-variable "policy_path" {
- description = "Path of policies to that should be added to IAM role for Lambda Function"
- type = string
- default = null
-}
-
variable "number_of_policy_jsons" {
description = "Number of policies JSON to attach to IAM role for Lambda Function"
type = number
@@ -806,6 +804,12 @@ variable "trigger_on_package_timestamp" {
default = true
}
+variable "quiet_archive_local_exec" {
+ description = "Whether to disable archive local execution output"
+ type = bool
+ default = true
+}
+
############################################
# Lambda Advanced Logging Settings
############################################
diff --git a/versions.tf b/versions.tf
index bf462c65..a80f6eb3 100644
--- a/versions.tf
+++ b/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
external = {
source = "hashicorp/external"
diff --git a/wrappers/alias/versions.tf b/wrappers/alias/versions.tf
index dbc484ad..f648e20c 100644
--- a/wrappers/alias/versions.tf
+++ b/wrappers/alias/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 4.9"
+ version = ">= 6.0"
}
}
}
diff --git a/wrappers/deploy/versions.tf b/wrappers/deploy/versions.tf
index 5a82f93b..e7881b92 100644
--- a/wrappers/deploy/versions.tf
+++ b/wrappers/deploy/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 3.35"
+ version = ">= 6.0"
}
local = {
source = "hashicorp/local"
diff --git a/wrappers/docker-build/versions.tf b/wrappers/docker-build/versions.tf
index 454fc7ae..8b20e477 100644
--- a/wrappers/docker-build/versions.tf
+++ b/wrappers/docker-build/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 4.22"
+ version = ">= 6.0"
}
docker = {
source = "kreuzwerker/docker"
diff --git a/wrappers/main.tf b/wrappers/main.tf
index 1092b4d3..eb78bb41 100644
--- a/wrappers/main.tf
+++ b/wrappers/main.tf
@@ -94,13 +94,14 @@ module "wrapper" {
policy_json = try(each.value.policy_json, var.defaults.policy_json, null)
policy_jsons = try(each.value.policy_jsons, var.defaults.policy_jsons, [])
policy_name = try(each.value.policy_name, var.defaults.policy_name, null)
- policy_path = try(each.value.policy_path, var.defaults.policy_path, null)
policy_statements = try(each.value.policy_statements, var.defaults.policy_statements, {})
provisioned_concurrent_executions = try(each.value.provisioned_concurrent_executions, var.defaults.provisioned_concurrent_executions, -1)
publish = try(each.value.publish, var.defaults.publish, false)
putin_khuylo = try(each.value.putin_khuylo, var.defaults.putin_khuylo, true)
+ quiet_archive_local_exec = try(each.value.quiet_archive_local_exec, var.defaults.quiet_archive_local_exec, true)
recreate_missing_package = try(each.value.recreate_missing_package, var.defaults.recreate_missing_package, true)
recursive_loop = try(each.value.recursive_loop, var.defaults.recursive_loop, null)
+ region = try(each.value.region, var.defaults.region, null)
replace_security_groups_on_destroy = try(each.value.replace_security_groups_on_destroy, var.defaults.replace_security_groups_on_destroy, null)
replacement_security_group_ids = try(each.value.replacement_security_group_ids, var.defaults.replacement_security_group_ids, null)
reserved_concurrent_executions = try(each.value.reserved_concurrent_executions, var.defaults.reserved_concurrent_executions, -1)
diff --git a/wrappers/versions.tf b/wrappers/versions.tf
index bf462c65..a80f6eb3 100644
--- a/wrappers/versions.tf
+++ b/wrappers/versions.tf
@@ -1,10 +1,10 @@
terraform {
- required_version = ">= 1.0"
+ required_version = ">= 1.10"
required_providers {
aws = {
source = "hashicorp/aws"
- version = ">= 5.79"
+ version = ">= 6.0"
}
external = {
source = "hashicorp/external"