Skip to content

Commit

Permalink
add change log to s3
Browse files Browse the repository at this point in the history
  • Loading branch information
guyrenny committed Aug 17, 2023
1 parent cf49bbd commit 457081e
Show file tree
Hide file tree
Showing 8 changed files with 13 additions and 10 deletions.
2 changes: 1 addition & 1 deletion modules/cloudwatch-logs/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@
* [Update] Add support for govcloud, by adding custom_s3_bucket variable.

### 0.0.1 / 3.8.2023
* [Update] Add support to use a private link with coralogix - add subnet_id and security_group_id variable to connect the lambda to vpc.
* [Update] Add support to use a private link with coralogix - add subnet_id and security_group_id variable to connect the lambda to vpc.
2 changes: 1 addition & 1 deletion modules/cloudwatch-logs/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -112,4 +112,4 @@ variable "create_secret" {
description = "Set to False In case you want to use SSM with your secret that contains coralogix private key"
type = string
default = "True"
}
}
2 changes: 1 addition & 1 deletion modules/kinesis/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,4 @@
* [Update] Add an option to use an existing secret instead of creating a new one with SSM, and remove ssm_enabled variable.

### 0.0.1 / 8.8.23
* [Update] Add support for govcloud, by adding custom_s3_bucket variable.
* [Update] Add support for govcloud, by adding custom_s3_bucket variable.
4 changes: 2 additions & 2 deletions modules/kinesis/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ resource "random_string" "this" {
resource "null_resource" "s3_bucket" {
count = var.custom_s3_bucket == "" ? 0 : 1
provisioner "local-exec" {
command = "curl -o ${var.package_name}.zip https://coralogix-serverless-repo-eu-central-1.s3.eu-central-1.amazonaws.com/${var.package_name}.zip ; aws s3 cp ./${var.package_name}.zip s3://${var.custom_s3_bucket} ; rm ./${var.package_name}.zip"
command = "curl -o ${var.package_name}.zip https://coralogix-serverless-repo-eu-central-1.s3.eu-central-1.amazonaws.com/${var.package_name}.zip ; aws s3 cp ./${var.package_name}.zip s3://${var.custom_s3_bucket} ; rm ./${var.package_name}.zip"
}
}

Expand Down Expand Up @@ -170,4 +170,4 @@ resource "aws_secretsmanager_secret_version" "service_user" {
depends_on = [aws_secretsmanager_secret.private_key_secret]
secret_id = aws_secretsmanager_secret.private_key_secret[count.index].id
secret_string = var.private_key
}
}
2 changes: 1 addition & 1 deletion modules/resource-metadata/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,4 @@
* [Update] Add an option to use an existing secret instead of creating a new one with SSM, and remove ssm_enabled variable.

### 0.0.1 / 8.8.23
* [Update] Add support for govcloud, by adding custom_s3_bucket variable.
* [Update] Add support for govcloud, by adding custom_s3_bucket variable.
4 changes: 2 additions & 2 deletions modules/resource-metadata/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ resource "random_string" "this" {
resource "null_resource" "s3_bucket" {
count = var.custom_s3_bucket == "" ? 0 : 1
provisioner "local-exec" {
command = "curl -o ${var.package_name}.zip https://coralogix-serverless-repo-eu-central-1.s3.eu-central-1.amazonaws.com/${var.package_name}.zip ; aws s3 cp ./${var.package_name}.zip s3://${var.custom_s3_bucket} ; rm ./${var.package_name}.zip"
command = "curl -o ${var.package_name}.zip https://coralogix-serverless-repo-eu-central-1.s3.eu-central-1.amazonaws.com/${var.package_name}.zip ; aws s3 cp ./${var.package_name}.zip s3://${var.custom_s3_bucket} ; rm ./${var.package_name}.zip"
}
}

Expand Down Expand Up @@ -213,4 +213,4 @@ resource "aws_sns_topic_subscription" "this" {
topic_arn = aws_sns_topic.this.arn
protocol = "email"
endpoint = var.notification_email
}
}
3 changes: 3 additions & 0 deletions modules/s3/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,3 +4,6 @@

### 0.0.1 / 16.8.2023
* [Update] Add an option to use an existing secret instead of creating a new one with SSM, and remove ssm_enabled variable.

### 0.0.1 / 8.8.23
* [Update] Add support for govcloud, by adding custom_s3_bucket variable.
4 changes: 2 additions & 2 deletions modules/s3/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ resource "random_string" "this" {
resource "null_resource" "s3_bucket_copy" {
count = var.custom_s3_bucket == "" ? 0 : 1
provisioner "local-exec" {
command = "curl -o ${var.integration_type}.zip https://coralogix-serverless-repo-eu-central-1.s3.eu-central-1.amazonaws.com/${var.integration_type}.zip ; aws s3 cp ./${var.integration_type}.zip s3://${var.custom_s3_bucket} ; rm ./${var.integration_type}.zip"
command = "curl -o ${var.integration_type}.zip https://coralogix-serverless-repo-eu-central-1.s3.eu-central-1.amazonaws.com/${var.integration_type}.zip ; aws s3 cp ./${var.integration_type}.zip s3://${var.custom_s3_bucket} ; rm ./${var.integration_type}.zip"
}
}

Expand Down Expand Up @@ -244,4 +244,4 @@ resource "aws_sns_topic_subscription" "lambda_sns_subscription" {
topic_arn = data.aws_sns_topic.sns_topic[count.index].arn
protocol = "lambda"
endpoint = var.layer_arn != "" ? module.lambdaSSM.lambda_function_arn : module.lambda.lambda_function_arn
}
}

0 comments on commit 457081e

Please sign in to comment.